Sciweavers

16190 search results - page 2741 / 3238
» Applicative programming with effects
Sort
View
150
Voted
GECCO
2006
Springer
167views Optimization» more  GECCO 2006»
15 years 7 months ago
Estimating the destructiveness of crossover on binary tree representations
In some cases, evolutionary algorithms represent individuals as typical binary trees with n leaves and n-1 internal nodes. When designing a crossover operator for a particular rep...
Luke Sheneman, James A. Foster
152
Voted
3DIM
2001
IEEE
15 years 7 months ago
Efficient Variants of the ICP Algorithm
The ICP (Iterative Closest Point) algorithm is widely used for geometric alignment of three-dimensional models when an initial estimate of the relative pose is known. Many variant...
Szymon Rusinkiewicz, Marc Levoy
112
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Information Security: Science, Pseudoscience, and Flying Pigs
The state of the science of information security is astonishingly rich with solutions and tools to incrementally and selectively solve the hard problems. In contrast, the state of...
Roger R. Schell
128
Voted
AFRIGRAPH
2003
ACM
15 years 7 months ago
A lightwave 3D plug-in for modeling long hair on virtual humans
Multimedia applications today make use of virtual humans. Generating realistic virtual humans is a challenging problem owing to a number of factors, one being the simulation of re...
Deborah Patrick, Shaun Bangay
129
Voted
CCGRID
2001
IEEE
15 years 7 months ago
Sabotage-Tolerance Mechanisms for Volunteer Computing Systems
In this paper, we address the new problem of protecting volunteer computing systems from malicious volunteers who submit erroneous results by presenting sabotagetolerance mechanis...
Luis F. G. Sarmenta
« Prev « First page 2741 / 3238 Last » Next »