Sciweavers

5122 search results - page 170 / 1025
» Comparing Consequence Relations
Sort
View
104
Voted
CEC
2007
IEEE
15 years 10 months ago
Emergent specialization in the extended multi-rover problem
Abstract— This paper introduces the Collective Neuro Evolution (CONE) method, and compares its efficacy for designing specialization, with a conventional Neuro-Evolution (NE) me...
Geoff S. Nitschke, Martijn C. Schut, A. E. Eiben
CHES
2004
Springer
106views Cryptology» more  CHES 2004»
15 years 7 months ago
XTR Implementation on Reconfigurable Hardware
Abstract. Recently, Lenstra and Verheul proposed an efficient cryptosystem called XTR. This system represents elements of F p6 with order dividing p2 -p+1 by their trace over Fp2 ....
Eric Peeters, Michael Neve, Mathieu Ciet
121
Voted
APSEC
1995
IEEE
15 years 7 months ago
An Empirical Study on Software Error Detection: Voting, Instrumentation, and Fagan Inspection
Thispaper presents the results of an experiment that compared error detection capability of voting, instrumentation,and Fagan inspection methods. Several experimentshave measured ...
Sun Sup So, Yongseop Lim, Sung Deok Cha, Yong Rae ...
CVPR
2005
IEEE
16 years 5 months ago
Asymmetrical Occlusion Handling Using Graph Cut for Multi-View Stereo
Occlusion is usually modelled in two images symmetrically in previous stereo algorithms which cannot work for multi-view stereo efficiently. In this paper, we present a novel form...
Yichen Wei, Long Quan
ICIP
2005
IEEE
16 years 5 months ago
Misregistration errors in change detection algorithms and how to avoid them
Background subtraction is a popular algorithm for video object segmentation. It identifies foreground objects by comparing the input images with a pure background image. In camera...
Dirk Farin, Peter H. N. de With