Sciweavers

2863 search results - page 409 / 573
» Constructing minimum-interference networks
Sort
View
98
Voted
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 10 months ago
Interorganizational Governance of Information Technology
This study aims at better understanding how information technology (IT) governance supports organizations in their business exchanges with other organizations. Its main objective ...
Anne-Marie Croteau, François Bergeron
123
Voted
HYBRID
2009
Springer
15 years 10 months ago
Optimization of Multi-agent Motion Programs with Applications to Robotic Marionettes
Abstract. In this paper, we consider the problem of generating optimized, executable control code from high-level, symbolic specifications. In particular, we construct symbolic co...
Patrick Martin, Magnus Egerstedt
109
Voted
DATE
2009
IEEE
88views Hardware» more  DATE 2009»
15 years 10 months ago
Rewiring using IRredundancy Removal and Addition
—Redundancy Addition and Removal (RAR) is a restructuring technique used in the synthesis and optimization of logic designs. It can remove an existing target wire and add an alte...
Chun-Chi Lin, Chun-Yao Wang
ICDAR
2009
IEEE
15 years 10 months ago
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm
We have proposed a complete system for text detection and localization in gray scale scene images. A boosting framework integrating feature and weak classifier selection based on...
Shehzad Muhammad Hanif, Lionel Prevost
WEBI
2009
Springer
15 years 10 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li