Sciweavers

374 search results - page 65 / 75
» An experimental study of optimizing bioinformatics applicati...
Sort
View
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
15 years 3 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
CIDR
2007
141views Algorithms» more  CIDR 2007»
15 years 1 months ago
Fragmentation in Large Object Repositories
Fragmentation leads to unpredictable and degraded application performance. While these problems have been studied in detail for desktop filesystem workloads, this study examines n...
Russell Sears, Catharine van Ingen
PAA
2006
14 years 11 months ago
Audio-visual sports highlights extraction using Coupled Hidden Markov Models
We present our studies on the application of Coupled Hidden Markov Models(CHMMs) to sports highlights extraction from broadcast video using both audio and video information. First,...
Ziyou Xiong
ECCV
2002
Springer
16 years 1 months ago
Visual Data Fusion for Objects Localization by Active Vision
Visual sensors provide exclusively uncertain and partial knowledge of a scene. In this article, we present a suitable scene knowledge representation that makes integration and fusi...
François Chaumette, Grégory Flandin
ICASSP
2008
IEEE
15 years 6 months ago
Learning to satisfy
This paper investigates a class of learning problems called learning satisfiability (LSAT) problems, where the goal is to learn a set in the input (feature) space that satisfies...
Frederic Thouin, Mark Coates, Brian Eriksson, Robe...