Sciweavers

4815 search results - page 247 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
ISPEC
2005
Springer
15 years 10 months ago
Robust Routing in Malicious Environment for Ad Hoc Networks
Abstract. Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the...
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, W...
SCALESPACE
2009
Springer
15 years 11 months ago
An Unconstrained Multiphase Thresholding Approach for Image Segmentation
Abstract. In this paper we provide a method to find global minimizers of certain non-convex 2-phase image segmentation problems. This is achieved by formulating a convex minimizat...
Benjamin Berkels
ICSE
1995
IEEE-ACM
15 years 8 months ago
Software Requirements Negotiation and Renegotiation Aids: A Theory-W Based Spiral Approach
A major problem in requirements engineering is obtaining requirements that address the concerns of multiple stakeholders. An approach to such a problem is the Theory-W based Spira...
Barry W. Boehm, Prasanta K. Bose, Ellis Horowitz, ...
PR
2006
127views more  PR 2006»
15 years 4 months ago
On solving the face recognition problem with one training sample per subject
The lack of adequate training samples and the considerable variations observed in the available image collections due to aging, illumination and pose variations are the two key te...
Jie Wang, Kostas N. Plataniotis, Juwei Lu, Anastas...
PAMI
2011
14 years 11 months ago
Action Recognition Using Mined Hierarchical Compound Features
—The field of Action Recognition has seen a large increase in activity in recent years. Much of the progress has been through incorporating ideas from single frame object recogn...
Andrew Gilbert, John Illingworth, Richard Bowden