Sciweavers

2977 search results - page 416 / 596
» Evaluating the Effectiveness of Keyword Search
Sort
View
148
Voted
GECCO
2011
Springer
248views Optimization» more  GECCO 2011»
14 years 5 months ago
Size-based tournaments for node selection
In genetic programming, the reproductive operators of crossover and mutation both require the selection of nodes from the reproducing individuals. Both unbiased random selection a...
Thomas Helmuth, Lee Spector, Brian Martin
ICDAR
2011
IEEE
14 years 1 months ago
Symbol Spotting in Line Drawings through Graph Paths Hashing
—In this paper we propose a symbol spotting technique through hashing the shape descriptors of graph paths (Hamiltonian paths). Complex graphical structures in line drawings can ...
Anjan Dutta, Josep Lladós, Umapada Pal
SAC
2010
ACM
15 years 8 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
112
Voted
MHCI
2009
Springer
15 years 8 months ago
Improving the accessibility of NFC/RFID-based mobile interaction through learnability and guidance
NFC and RFID technologies have found their way into current mobile phones and research has presented a variety of applications using NFC/RFID tags for interaction between physical...
Gregor Broll, Susanne Keck, Paul Holleis, Andreas ...
116
Voted
OOPSLA
2007
Springer
15 years 8 months ago
Using hpm-sampling to drive dynamic compilation
All high-performance production JVMs employ an adaptive strategy for program execution. Methods are first executed unoptimized and then an online profiling mechanism is used to ...
Dries Buytaert, Andy Georges, Michael Hind, Matthe...