Sciweavers

2117 search results - page 343 / 424
» Data Modelling in Complex Application Domains
Sort
View
CVPR
2011
IEEE
14 years 7 months ago
Activity Recognition using Dynamic Subspace Angles
Cameras are ubiquitous everywhere and hold the promise of significantly changing the way we live and interact with our environment. Human activity recognition is central to under...
Octavia Camps, Mario Sznaier, Binlong Li, Teresa M...
120
Voted
GECCO
2009
Springer
127views Optimization» more  GECCO 2009»
15 years 10 months ago
Geometrical insights into the dendritic cell algorithm
This work examines the dendritic cell algorithm (DCA) from a mathematical perspective. By representing the signal processing phase of the algorithm using the dot product it is sho...
Thomas Stibor, Robert Oates, Graham Kendall, Jonat...
133
Voted
FC
2005
Springer
110views Cryptology» more  FC 2005»
15 years 9 months ago
Approximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly s...
Giovanni Di Crescenzo, R. F. Graveman, Renwei Ge, ...
IEEEPACT
2009
IEEE
15 years 1 months ago
ITCA: Inter-task Conflict-Aware CPU Accounting for CMPs
Abstract--Chip-MultiProcessor (CMP) architectures are becoming more and more popular as an alternative to the traditional processors that only extract instruction-level parallelism...
Carlos Luque, Miquel Moretó, Francisco J. C...
GECCO
2009
Springer
148views Optimization» more  GECCO 2009»
15 years 1 months ago
Genetic programming for quantitative stock selection
We provide an overview of using genetic programming (GP) to model stock returns. Our models employ GP terminals (model decision variables) that are financial factors identified by...
Ying L. Becker, Una-May O'Reilly