Sciweavers

3333 search results - page 577 / 667
» Abstract Proof Search
Sort
View
GECCO
2003
Springer
128views Optimization» more  GECCO 2003»
15 years 9 months ago
Cellular Programming and Symmetric Key Cryptography Systems
Abstract. The problem of designing symmetric key cryptography algorithms based upon cellular automata (CAs) is considered. The reliability of the Vernam cipher used in the process ...
Franciszek Seredynski, Pascal Bouvry, Albert Y. Zo...
IDA
2003
Springer
15 years 9 months ago
Learning Dynamic Bayesian Networks from Multivariate Time Series with Changing Dependencies
Abstract. Many examples exist of multivariate time series where dependencies between variables change over time. If these changing dependencies are not taken into account, any mode...
Allan Tucker, Xiaohui Liu
CPAIOR
2010
Springer
15 years 8 months ago
A Constraint Integer Programming Approach for Resource-Constrained Project Scheduling
Abstract. We propose a hybrid approach for solving the resource-constrained project scheduling problem which is an extremely hard to solve combinatorial optimization problem of pra...
Timo Berthold, Stefan Heinz, Marco E. Lübbeck...
ECCV
2010
Springer
15 years 8 months ago
Combining Geometric and Appearance Priors for Robust Homography Estimation
Abstract. The homography between pairs of images are typically computed from the correspondence of keypoints, which are established by using image descriptors. When these descripto...
ECCV
2010
Springer
15 years 8 months ago
Discriminative Spatial Attention for Robust Tracking
Abstract. A major reason leading to tracking failure is the spatial distractions that exhibit similar visual appearances as the target, because they also generate good matches to t...