Sciweavers

7129 search results - page 1107 / 1426
» Approximation Algorithms for Treewidth
Sort
View
124
Voted
MM
2009
ACM
118views Multimedia» more  MM 2009»
15 years 10 months ago
Vocabulary-based hashing for image search
This paper proposes a hash function family based on feature vocabularies and investigates the application in building indexes for image search. Each hash function is associated wi...
Yingyu Liang, Jianmin Li, Bo Zhang
175
Voted
SMA
2009
ACM
134views Solid Modeling» more  SMA 2009»
15 years 10 months ago
Exact Delaunay graph of smooth convex pseudo-circles: general predicates, and implementation for ellipses
We examine the problem of computing exactly the Delaunay graph (and the dual Voronoi diagram) of a set of, possibly intersecting, smooth convex pseudo-circles in the Euclidean pla...
Ioannis Z. Emiris, Elias P. Tsigaridas, George M. ...
121
Voted
ASIAMS
2008
IEEE
15 years 10 months ago
A Fuzzy Particle Swarm Approach to Multiobjective Quadratic Assignment Problems
The multiobjective Quadratic Assignment Problem (mQAP) is considered as one of the hardest optimization problems but with many real-world applications. Since it may not be possibl...
Mingyan Zhao, Ajith Abraham, Crina Grosan, Hongbo ...
159
Voted
CISIM
2008
IEEE
15 years 10 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
133
Voted
CISS
2008
IEEE
15 years 10 months ago
Optimal path planning for mobile backbone networks
— Mobile Backbone Networks are heterogeneous wireless networks in which a subset of the nodes are more capable than others. The more capable nodes are referred to as Mobile Backb...
Anand Srinivas, Eytan Modiano
« Prev « First page 1107 / 1426 Last » Next »