Sciweavers

2050 search results - page 312 / 410
» constraints 2010
Sort
View
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 8 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...
CORR
2010
Springer
72views Education» more  CORR 2010»
13 years 8 months ago
Minimizing weighted sum delay for one-to-many file transfer in peer-to-peer networks
Abstract-- This paper considers the problem of transferring a file from one source node to multiple receivers in a peer-to-peer (P2P) network. The objective is to minimize the weig...
Bike Xie, Mihaela van der Schaar, Richard D. Wesel
CORR
2010
Springer
93views Education» more  CORR 2010»
13 years 8 months ago
Generalized roof duality and bisubmodular functions
Consider a convex relaxation ^f of a pseudo-boolean function f. We say that the relaxation is totally half-integral if ^f(x) is a polyhedral function with halfintegral extreme poi...
Vladimir Kolmogorov
CVPR
2010
IEEE
13 years 8 months ago
Rapid and accurate developmental stage recognition of C. elegans from high-throughput image data
We present a hierarchical principle for object recognition and its application to automatically classify developmental stages of C. elegans animals from a population of mixed stag...
Amelia White, Huey-Ling Kao, Patricia Cipriani, Br...
AUSAI
2010
Springer
13 years 8 months ago
Tuning Java to Run Interactive Multiagent Simulations over Jason
Java-based simulation environments are currently used by many multiagent systems (MAS), since they mainly provide portability as well as an interesting reduction of the development...
Víctor Fernández-Bauset, Francisco G...