Sciweavers

4233 search results - page 685 / 847
» Three Paths to Effectiveness
Sort
View
INFOCOM
2011
IEEE
14 years 8 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
ACISICIS
2010
IEEE
14 years 8 months ago
A Study on Defect Density of Open Source Software
— Open source software (OSS) development is considered an effective approach to ensuring acceptable levels of software quality. One facet of quality improvement involves the dete...
Cobra Rahmani, Deepak Khazanchi
ASYNC
2010
IEEE
230views Hardware» more  ASYNC 2010»
14 years 8 months ago
The Devolution of Synchronizers
— Synchronizers play a key role in multi-clock domain systems on chip. Traditionally, improvement of synchronization parameters with scaling has been assumed. In particular, the ...
Salomon Beer, Ran Ginosar, Michael Priel, Rostisla...
FGR
2011
IEEE
263views Biometrics» more  FGR 2011»
14 years 8 months ago
Exploiting long-term observations for track creation and deletion in online multi-face tracking
— In many visual multi-object tracking applications, the question when to add or remove a target is not trivial due to, for example, erroneous outputs of object detectors or obse...
Stefan Duffner, Jean-Marc Odobez
GECCO
2011
Springer
248views Optimization» more  GECCO 2011»
14 years 8 months ago
Size-based tournaments for node selection
In genetic programming, the reproductive operators of crossover and mutation both require the selection of nodes from the reproducing individuals. Both unbiased random selection a...
Thomas Helmuth, Lee Spector, Brian Martin