Sciweavers

514 search results - page 60 / 103
» Packet Classification Algorithms: From Theory to Practice
Sort
View
ICCV
2009
IEEE
1035views Computer Vision» more  ICCV 2009»
15 years 1 months ago
Efficient High-Quality Image Contour Detection
Image contour detection is fundamental to many image analysis applications, including image segmentation, object recognition and classification. However, highly accurate image c...
Bryan Catanzaro, Bor-Yiing Su, Narayanan Sundaram,...
TWC
2010
13 years 3 months ago
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
In this paper, we consider a special case of denial of service (DoS) attack in wireless mesh networks (WMNs) known as selective forwarding attack (a.k.a gray hole attacks). With su...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
CIKM
2001
Springer
14 years 1 months ago
Reorganizing Web Sites Based on User Access Patterns
In this paper, an approach for reorganizing Web sites based on user access patterns is proposed. Our goal is to build adaptive Web sites by evolving site structure to facilitate u...
Yongjian Fu, Mario Creado, Chunhua Ju
GECCO
2008
Springer
184views Optimization» more  GECCO 2008»
13 years 10 months ago
Evolutionary facial feature selection
With the growing number of acquired physiological and behavioral biometric samples, biometric data sets are experiencing tremendous growth. As database sizes increase, exhaustive ...
Aaron K. Baughman
SIAMJO
2002
159views more  SIAMJO 2002»
13 years 8 months ago
Locating the Least 2-Norm Solution of Linear Programs via a Path-Following Method
A linear program has a unique least 2-norm solution provided that the linear program has a solution. To locate this solution, most of the existing methods were devised to solve cer...
Yun-Bin Zhao, Duan Li