Sciweavers

2899 search results - page 461 / 580
» Engineering Optimization Using a Simple Evolutionary Algorit...
Sort
View
99
Voted
BIRTHDAY
2003
Springer
15 years 6 months ago
Parallel Digital Halftoning by Error-Diffusion
Digital halftoning, or dithering, is the technique commonly used to render a color or grayscale image on a printer, a computer monitor or other bi-level displays. A particular hal...
Panagiotis Takis Metaxas
105
Voted
COOPIS
2000
IEEE
15 years 5 months ago
Dynamic Pricing with Limited Competitor Information in a Multi-Agent Economy
We study the price dynamics in a multi-agent economy consisting of buyers and competing sellers, where each seller has limited information about its competitors’ prices. In this ...
Prithviraj Dasgupta, Rajarshi Das
108
Voted
JSAC
2006
128views more  JSAC 2006»
15 years 22 days ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
ICONIP
2010
14 years 10 months ago
Online Gesture Recognition for User Interface on Accelerometer Built-in Mobile Phones
Recently, several smart phones are equipped with a 3D-accelerometer that can be used for gesture-based user interface (UI). In order to utilize the gesture UI for the real-time sys...
BongWhan Choe, Jun-Ki Min, Sung-Bae Cho
127
Voted
ISSTA
2012
ACM
13 years 3 months ago
A quantitative study of accuracy in system call-based malware detection
Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...