Sciweavers

1790 search results - page 270 / 358
» Noise in Bilinear Problems
Sort
View
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
DEXA
2005
Springer
109views Database» more  DEXA 2005»
14 years 1 months ago
Web Query Expansion by WordNet
In this paper, we address a novel method of Web query expansion by using WordNet and TSN. WordNet is an online lexical dictionary which describes word relationships in three dimens...
Zhiguo Gong, Chan Wa Cheang, Leong Hou U
GECCO
2005
Springer
146views Optimization» more  GECCO 2005»
14 years 1 months ago
An empirical study of the robustness of two module clustering fitness functions
Two of the attractions of search-based software engineering (SBSE) derive from the nature of the fitness functions used to guide the search. These have proved to be highly robust...
Mark Harman, Stephen Swift, Kiarash Mahdavi
GECCO
2005
Springer
175views Optimization» more  GECCO 2005»
14 years 1 months ago
Inverse multi-objective robust evolutionary design optimization in the presence of uncertainty
In many real-world design problems, uncertainties are often present and practically impossible to avoid. Many existing works on Evolutionary Algorithm (EA) for handling uncertaint...
Dudy Lim, Yew-Soon Ong, Bu-Sung Lee
ICANN
2005
Springer
14 years 1 months ago
Accurate and Robust Image Superresolution by Neural Processing of Local Image Representations
Image superresolution involves the processing of an image sequence to generate a still image with higher resolution. Classical approaches, such as bayesian MAP methods, require ite...
Carlos Miravet, Francisco de Borja Rodrígue...