Sciweavers

661 search results - page 64 / 133
» Bandwidth Sharing: Objectives and Algorithms
Sort
View
DSN
2009
IEEE
15 years 4 months ago
Comparing anomaly-detection algorithms for keystroke dynamics
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
Kevin S. Killourhy, Roy A. Maxion
TEC
2002
161views more  TEC 2002»
14 years 9 months ago
A fast and elitist multiobjective genetic algorithm: NSGA-II
Multiobjective evolutionary algorithms (EAs) that use nondominated sorting and sharing have been criticized mainly for their: 1) ( 3) computational complexity (where is the number ...
Kalyanmoy Deb, Samir Agrawal, Amrit Pratap, T. Mey...
ECOOP
2008
Springer
14 years 11 months ago
Programming with Live Distributed Objects
A component revolution is underway, bringing developers improved productivity and opportunities for code reuse. However, whereas existing tools work well for builders of desktop ap...
Krzysztof Ostrowski, Ken Birman, Danny Dolev, Jong...
INFORMS
2008
55views more  INFORMS 2008»
14 years 9 months ago
Mathematical Programming Algorithms for Two-Path Routing Problems with Reliability Considerations
Most traditional routing problems assume perfect operability of all arcs and nodes. However, when independent arc failure probabilities exist, a secondary objective must be presen...
April K. Andreas, J. Cole Smith
ECCV
2006
Springer
15 years 11 months ago
TextonBoost: Joint Appearance, Shape and Context Modeling for Multi-class Object Recognition and Segmentation
Abstract. This paper proposes a new approach to learning a discriminative model of object classes, incorporating appearance, shape and context information efficiently. The learned ...
Jamie Shotton, John M. Winn, Carsten Rother, Anton...