Sciweavers

6293 search results - page 1090 / 1259
» Information Flow Testing
Sort
View
130
Voted
RAS
2008
139views more  RAS 2008»
15 years 2 months ago
Unsupervised identification of useful visual landmarks using multiple segmentations and top-down feedback
In this paper, we tackle the problem of unsupervised selection and posterior recognition of visual landmarks in images sequences acquired by an indoor mobile robot. This is a high...
Pablo Espinace, Daniel Langdon, Alvaro Soto
SAC
2008
ACM
15 years 2 months ago
A clustering-based approach for discovering interesting places in trajectories
Because of the large amount of trajectory data produced by mobile devices, there is an increasing need for mechanisms to extract knowledge from this data. Most existing works have...
Andrey Tietbohl Palma, Vania Bogorny, Bart Kuijper...
163
Voted
ENTCS
2008
390views more  ENTCS 2008»
15 years 1 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
135
Voted
ESWA
2008
134views more  ESWA 2008»
15 years 1 months ago
Neighborhood classifiers
K nearest neighbor classifier (K-NN) is widely discussed and applied in pattern recognition and machine learning, however, as a similar lazy classifier using local information for...
Qinghua Hu, Daren Yu, Zongxia Xie
ICFEM
2010
Springer
15 years 1 months ago
Dynamic Resource Reallocation between Deployment Components
Abstract. Today’s software systems are becoming increasingly configurable and designed for deployment on a plethora of architectures, ranging from sequential machines via multic...
Einar Broch Johnsen, Olaf Owe, Rudolf Schlatte, Si...
« Prev « First page 1090 / 1259 Last » Next »