Sciweavers

1242 search results - page 88 / 249
» Digital Objects as Passwords
Sort
View
GECCO
2009
Springer
199views Optimization» more  GECCO 2009»
15 years 2 months ago
Using behavioral exploration objectives to solve deceptive problems in neuro-evolution
Encouraging exploration, typically by preserving the diversity within the population, is one of the most common method to improve the behavior of evolutionary algorithms with dece...
Jean-Baptiste Mouret, Stéphane Doncieux
ACMSE
2009
ACM
15 years 1 months ago
Using computer graphics to explore object oriented concepts using C
Most recent graphics courses are what we would call topdown courses. Courses that focus on using graphical packages to implement and teach graphics. The course discussed in this p...
William C. Kreahling
GIS
2002
ACM
14 years 9 months ago
A road network embedding technique for k-nearest neighbor search in moving object databases
A very important class of queries in GIS applications is the class of K-Nearest Neighbor queries. Most of the current studies on the K-Nearest Neighbor queries utilize spatial ind...
Cyrus Shahabi, Mohammad R. Kolahdouzan, Mehdi Shar...
DGO
2004
105views Education» more  DGO 2004»
14 years 11 months ago
Modeling and Comparing Spatiotemporal Events
Spatiotemporal helixes constitute a novel method we developed for modeling changes in an object over time. Changes in both an object's trajectory and its outline can be repre...
Kristin Eickhorst, Peggy Agouris, Anthony Stefanid...
MM
1997
ACM
182views Multimedia» more  MM 1997»
15 years 2 months ago
VideoQ: An Automated Content Based Video Search System Using Visual Cues
The rapidity with which digital information, particularly video is being generated, has necessitated the development of tools for efficient search of these digital media. Content...
Shih-Fu Chang, William Chen, Horace J. Meng, Hari ...