Sciweavers

3778 search results - page 625 / 756
» Erdos-Ko-Rado for three sets
Sort
View
MVA
2007
196views Computer Vision» more  MVA 2007»
15 years 6 months ago
Fingerprint Verification Using Perturbation Method
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...
Satoshi Otaka, Yoshihisa Nishiyama, Takahiro Hatan...
OPODIS
2007
15 years 6 months ago
Secretive Birds: Privacy in Population Protocols
We study private computations in a system of tiny mobile agents. We consider the mobile population protocol model of Angluin et al. [2] and ask what can be computed without ever re...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
SPLC
2008
15 years 6 months ago
Modeling the Variability Space of Self-Adaptive Applications
Modeling self-adaptive applications is a difficult task due to the complex relationships they have with their environments. Designers of such applications strive to model accurate...
Gilles Perrouin, Franck Chauvel, Julien DeAntoni, ...
SWWS
2008
15 years 6 months ago
A Harmony based Adaptive Ontology Mapping Approach
- Ontology mapping seeks to find semantic correspondences between similar elements of different ontologies. Ontology mapping is critical to achieve semantic interoperability in the...
Ming Mao, Yefei Peng, Michael Spring
RIAO
2007
15 years 6 months ago
From Layout to Semantic: a Reranking Model for Mapping Web Documents to Mediated XML Representations
Many documents on the Web are formated in a weakly structured format. Because of their weak semantic and because of the heterogeneity of their formats, the information conveyed by...
Guillaume Wisniewski, Patrick Gallinari