Sciweavers

1712 search results - page 106 / 343
» A Computational Approach to Binding Theory
Sort
View
ICPR
2004
IEEE
16 years 2 months ago
A Unified Information-Theoretic Approach to the Correspondence Problem in Image Registration
We consider the correspondence problem associated with the non-rigid registration of a group of images; in particular, the theoretical basis for the derivation of the objective fu...
Carole J. Twining, Stephen Marsland, Christopher J...
DCC
2007
IEEE
16 years 1 months ago
A sequence approach to linear perfect hash families
A linear (qd, q, t)-perfect hash family of size s in a vector space V of order qd over a field F of order q consists of a set S = {1, . . . , s} of linear functionals from V to F ...
Susan G. Barwick, Wen-Ai Jackson
LATA
2009
Springer
15 years 8 months ago
From Gene Trees to Species Trees through a Supertree Approach
Abstract. Gene trees are leaf-labeled trees inferred from molecular sequences. Due to duplication events arising in genome evolution, gene trees usually have multiple copies of som...
Celine Scornavacca, Vincent Berry, Vincent Ranwez
ICDCSW
2008
IEEE
15 years 8 months ago
Understanding the Tolerance of Dynamic Networks: A Routing-Oriented Approach
Research on delay tolerant networks (DTNs) has brought about a plethora of routing algorithms targeted at networks with different mobility patterns. However, few research works ha...
Yifeng Shao, Jie Wu
ICPP
2007
IEEE
15 years 8 months ago
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach
– Anonymous communication systems built on P2P infrastructures using anonymity forwarders are frequently affected by the churn problem, i.e. frequent joins and leaves of nodes. T...
Souvik Ray, Giora Slutzki, Zhao Zhang