Sciweavers

5948 search results - page 909 / 1190
» Computing Robust Counter-Strategies
Sort
View
ISVC
2007
Springer
15 years 10 months ago
Motion Projection for Floating Object Detection
Abstract. Floating mines are a significant threat to the safety of ships in theatres of military or terrorist conflict. Automating mine detection is difficult, due to the unpredict...
Zhaoyi Wei, Dah-Jye Lee, David Jilk, Robert B. Sch...
ISVC
2007
Springer
15 years 10 months ago
Automatic Image Representation for Content-Based Access to Personal Photo Album
Abstract. The proposed work exploits methods and techniques for automatic characterization of images for content-based access to personal photo libraries. Several techniques, even ...
Edoardo Ardizzone, Marco La Cascia, Filippo Vella
MFCS
2007
Springer
15 years 10 months ago
Evolvability
A framework for analyzing the computational capabilities and the limitations of the evolutionary process of random change guided by selection was recently introduced by Valiant [V...
Leslie G. Valiant
MIRAGE
2007
Springer
15 years 10 months ago
Model-Based Feature Extraction for Gait Analysis and Recognition
Human motion analysis has received a great attention from researchers in the last decade due to its potential use in different applications. We propose a new approach to extract h...
Imed Bouchrika, Mark S. Nixon
NETCOOP
2007
Springer
15 years 10 months ago
A Network Formation Game Approach to Study BitTorrent Tit-for-Tat
The Tit-for-Tat strategy implemented in BitTorrent (BT) clients is generally considered robust to selfish behaviours. The authors of [1] support this belief studying how Tit-for-T...
Giovanni Neglia, Giuseppe Lo Presti, Honggang Zhan...