Sciweavers

2157 search results - page 365 / 432
» Binary ant algorithm
Sort
View
ACCV
2009
Springer
15 years 6 months ago
Image-Set Based Face Recognition Using Boosted Global and Local Principal Angles
Face recognition using image-set or video sequence as input tends to be more robust since image-set or video sequence provides much more information than single snapshot about the ...
Xi Li, Kazuhiro Fukui, Nanning Zheng
IH
2009
Springer
15 years 6 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
SPIRE
2009
Springer
15 years 6 months ago
Generalised Matching
Given a pattern p over an alphabet Σp and a text t over an alphabet Σt, we consider the problem of determining a mapping f from Σp to Σ+ t such that t = f(p1)f(p2) . . . f(pm)....
Raphaël Clifford, Aram Wettroth Harrow, Alexa...
COMPSAC
2008
IEEE
15 years 6 months ago
Parallel Table Lookup for Next Generation Internet
The rapid growth of Internet population leads to the shortage of IP addresses. The next generation IP protocol, IPv6, which extends the IP address length from 32 bits to 128 bits,...
Li-Che Hung, Yaw-Chung Chen
DEXAW
2008
IEEE
252views Database» more  DEXAW 2008»
15 years 6 months ago
XML Tree Structure Compression
In an XML document a considerable fraction consists of markup, that is, begin and end-element tags describing the document’s tree structure. XML compression tools such as XMill ...
Sebastian Maneth, Nikolay Mihaylov, Sherif Sakr