Sciweavers

1508 search results - page 68 / 302
» A Toolbox of Level Set Methods
Sort
View
ACSW
2006
14 years 11 months ago
A method for access authorisation through delegation networks
Owners of systems and resources usually want to control who can access them. This must be based on having a process for authorising certain parties, combined with mechanisms for e...
Audun Jøsang, Dieter Gollmann, Richard Au
BMCBI
2006
114views more  BMCBI 2006»
14 years 10 months ago
Evaluation and comparison of mammalian subcellular localization prediction methods
Background: Determination of the subcellular location of a protein is essential to understanding its biochemical function. This information can provide insight into the function o...
Josefine Sprenger, J. Lynn Fink, Rohan D. Teasdale
ISOLA
2007
Springer
15 years 4 months ago
Proved Development of the Real-Time Properties of the IEEE 1394 Root Contention Protocol with the Event B Method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm, Dominique Cansell
MVA
2007
140views Computer Vision» more  MVA 2007»
14 years 11 months ago
A Review of Tracking Methods under Occlusions
Object tracking in computer vision refers to the task of tracking individual moving objects accurately from one frame to another in an image sequence. Several tracking methods hav...
Zui Zhang, Massimo Piccardi
ANOR
2010
102views more  ANOR 2010»
14 years 10 months ago
Ejection chain and filter-and-fan methods in combinatorial optimization
The design of effective neighborhood structures is fundamentally important for creating better local search and metaheuristic algorithms for combinatorial optimization. Significant...
César Rego, Fred Glover