Sciweavers

409 search results - page 41 / 82
» Classification Procedures for Software Evaluation
Sort
View
EDBTW
2004
Springer
15 years 3 months ago
Engineering Incentive Schemes for Ad Hoc Networks
In ad hoc networks, devices have to cooperate in order to compensate for the absence of infrastructure. Yet, autonomous devices tend to abstain from cooperation in order to save th...
Philipp Obreiter, Birgitta König-Ries, Georgi...
COR
2010
150views more  COR 2010»
14 years 10 months ago
Black box scatter search for general classes of binary optimization problems
The purpose of this paper is to apply the scatter search methodology to general classes of binary problems. We focus on optimization problems for which the solutions are represent...
Francisco Gortázar, Abraham Duarte, Manuel ...
CSCW
2010
ACM
15 years 6 months ago
Same places, same things, same people?: mining user similarity on social media
In this work we examine nine different sources for user similarity as reflected by activity in social media applications. We suggest a classification of these sources into three c...
Ido Guy, Michal Jacovi, Adam Perer, Inbal Ronen, E...
AAAI
2008
15 years 5 days ago
Learning to Analyze Binary Computer Code
We present a novel application of structured classification: identifying function entry points (FEPs, the starting byte of each function) in program binaries. Such identification ...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller...
IJCV
2000
164views more  IJCV 2000»
14 years 9 months ago
Probabilistic Modeling and Recognition of 3-D Objects
This paper introduces a uniform statistical framework for both 3-D and 2-D object recognition using intensity images as input data. The theoretical part provides a mathematical too...
Joachim Hornegger, Heinrich Niemann