Sciweavers

725 search results - page 100 / 145
» heuristics 2010
Sort
View
WCNC
2010
IEEE
14 years 1 months ago
Dynamic Control of Data Ferries under Partial Observations
—Controlled mobile helper nodes called data ferries have recently been proposed to bridge communications between disconnected nodes in a delay-tolerant manner. While existing wor...
Chi Harold Liu, Ting He, Kang-won Lee, Kin K. Leun...
CICLING
2010
Springer
14 years 1 months ago
Selecting the N-Top Retrieval Result Lists for an Effective Data Fusion
Although the application of data fusion in information retrieval has yielded good results in the majority of the cases, it has been noticed that its achievement is dependent on the...
Antonio Juárez-González, Manuel Mont...
ECCV
2010
Springer
14 years 1 months ago
Optimal Contour Closure by Superpixel Grouping
Abstract. Detecting contour closure, i.e., finding a cycle of disconnected contour fragments that separates an object from its background, is an important problem in perceptual gro...
CVPR
2010
IEEE
14 years 1 months ago
Metric-Induced Optimal Embedding for Intrinsic 3D Shape Analysis
For various 3D shape analysis tasks, the LaplaceBeltrami(LB) embedding has become increasingly popular as it enables the efficient comparison of shapes based on intrinsic geometry...
Rongjie Lai, Yonggang Shi, Kevin Scheibel, Scott F...
ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
14 years 1 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert