Sciweavers

3317 search results - page 76 / 664
» Strategies in Rigid-Variable Methods
Sort
View
FC
2007
Springer
136views Cryptology» more  FC 2007»
15 years 10 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
IEEEARES
2006
IEEE
15 years 10 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett
CAIP
2005
Springer
118views Image Analysis» more  CAIP 2005»
15 years 9 months ago
Method for Automatically Segmenting the Spinal Cord and Canal from 3D CT Images
We present two approaches for automatically segmenting the spinal cord/canal from native CT images of the thorax region containing the spine. Different strategies are included to ...
László G. Nyúl, Judit Kany&oa...
GECCO
2005
Springer
157views Optimization» more  GECCO 2005»
15 years 9 months ago
Simple addition of ranking method for constrained optimization in evolutionary algorithms
During the optimization of a constrained problem using evolutionary algorithms (EAs), an individual in the population can be described using three important properties, i.e., obje...
Pei Yee Ho, Kazuyuki Shimizu
164
Voted
SIGIR
2003
ACM
15 years 9 months ago
Beyond independent relevance: methods and evaluation metrics for subtopic retrieval
We present a non-traditional retrieval problem we call subtopic retrieval. The subtopic retrieval problem is concerned with finding documents that cover many different subtopics ...
ChengXiang Zhai, William W. Cohen, John D. Laffert...