Sciweavers

12257 search results - page 178 / 2452
» Analysis of Algorithms
Sort
View
ICDAR
2003
IEEE
15 years 7 months ago
Optimizing Binary Feature Vector Similarity Measure using Genetic Algorithm and Handwritten Character Recognition
Classifying an unknown input is a fundamental problem in pattern recognition. A common method is to define a distance metric between patterns and find the most similar pattern i...
Sung-Hyuk Cha, Charles C. Tappert, Sargur N. Sriha...
CVPR
2006
IEEE
15 years 7 months ago
A Modular Approach to the Analysis and Evaluation of Particle Filters for Figure Tracking
This paper presents the first systematic empirical study of the particle filter (PF) algorithms for human figure tracking in video. Our analysis and evaluation follows a modula...
Ping Wang, James M. Rehg
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
15 years 8 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
MOBIHOC
2007
ACM
16 years 1 months ago
Approximation algorithms for longest-lived directional multicast communications in WANETs
Several centralized and distributed algorithms have been recently proposed to maximize the multicast lifetime for directional communications in wireless ad-hoc networks. Their per...
Song Guo, Oliver W. W. Yang, Victor C. M. Leung
STACS
2009
Springer
15 years 8 months ago
Semi-Online Preemptive Scheduling: One Algorithm for All Variants
We present a unified optimal semi-online algorithm for preemptive scheduling on uniformly related machines with the objective to minimize the makespan. This algorithm works for a...
Tomás Ebenlendr, Jiri Sgall