Sciweavers

863 search results - page 107 / 173
» Computational Methods for Intelligent Information Access
Sort
View
107
Voted
GECCO
2005
Springer
116views Optimization» more  GECCO 2005»
15 years 9 months ago
Terrain generation using genetic algorithms
We propose a method for applying genetic algorithms to create 3D terrain data sets. Existing procedural algorithms for generation of terrain have several shortcomings. The most po...
TeongJoo Ong, Ryan Saunders, John Keyser, John J. ...
149
Voted
BMCBI
2011
14 years 10 months ago
A quality metric for homology modeling: the H-factor
Background: The analysis of protein structures provides fundamental insight into most biochemical functions and consequently into the cause and possible treatment of diseases. As ...
Eric di Luccio, Patrice Koehl
FGR
2008
IEEE
229views Biometrics» more  FGR 2008»
15 years 10 months ago
Activity detection in conversational sign language video for mobile telecommunication
The goal of the MobileASL project is to increase accessibility by making the mobile telecommunications network available to the signing Deaf community. Video cell phones enable De...
Neva Cherniavsky, Richard E. Ladner, Eve A. Riskin
131
Voted
CCS
2004
ACM
15 years 9 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
124
Voted
ACMICEC
2007
ACM
127views ECommerce» more  ACMICEC 2007»
15 years 7 months ago
Decentralized task allocation using magnet: an empirical evaluation in the logistics domain
This paper presents a decentralized task allocation method that can handle allocation of tasks with time and precedence constraints in a multi-agent setting where not all informat...
Mark Hoogendoorn, Maria L. Gini, Catholijn M. Jonk...