Sciweavers

13913 search results - page 2576 / 2783
» models 2007
Sort
View
ISCI
2007
135views more  ISCI 2007»
15 years 4 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
ISR
2007
15 years 4 months ago
Product Development and Pricing Strategy for Information Goods Under Heterogeneous Outside Opportunities
This paper considers a two-stage development problem for information goods with costless quality degradation. In our model, a seller of information goods faces customers that are ...
Ying-Ju Chen, Sridhar Seshadri
153
Voted
IVC
2007
266views more  IVC 2007»
15 years 4 months ago
Face detection and facial feature localization without considering the appearance of image context
Face and facial feature detection plays an important role in various applications such as human computer interaction, video surveillance, face tracking, and face recognition. Effi...
Suphakant Phimoltares, Chidchanok Lursinsap, Kosin...
JACM
2007
85views more  JACM 2007»
15 years 4 months ago
The rational numbers as an abstract data type
onal Numbers as an Abstract Data Type1 J A Bergstra2 University of Amsterdam, Informatics Institute, Kruislaan 403, 1098 SJ Amsterdam, The Netherlands J V Tucker3 Department of Com...
Jan A. Bergstra, J. V. Tucker
JAIR
2007
141views more  JAIR 2007»
15 years 4 months ago
Bin Completion Algorithms for Multicontainer Packing, Knapsack, and Covering Problems
Many combinatorial optimization problems such as the bin packing and multiple knapsack problems involve assigning a set of discrete objects to multiple containers. These problems ...
Alex S. Fukunaga, Richard E. Korf
« Prev « First page 2576 / 2783 Last » Next »