Sciweavers

340 search results - page 38 / 68
» Evaluation of Interest Point Detectors
Sort
View
103
Voted
SOSP
2007
ACM
15 years 9 months ago
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
Software defects significantly reduce system dependability. Among various types of software bugs, semantic and concurrency bugs are two of the most difficult to detect. This pape...
Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weiha...
ICIAR
2010
Springer
15 years 5 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl
77
Voted
EVI
2010
94views more  EVI 2010»
14 years 7 months ago
Collective neuro-evolution for evolving specialized sensor resolutions in a multi-rover task
This article presents results from an evaluation of the collective neuro-evolution (CONE) controller design method. CONE solves collective behavior tasks, and increases task perfor...
Geoff S. Nitschke, Martijn C. Schut, A. E. Eiben
102
Voted
CVPR
2008
IEEE
16 years 2 months ago
Constrained image segmentation from hierarchical boundaries
In this paper, we address the problem of constrained segmentation of natural images, in which a human user places one seed point inside each object of interest in the image and th...
Pablo Arbelaez, Laurent D. Cohen
VLDB
2009
ACM
159views Database» more  VLDB 2009»
16 years 1 months ago
Anytime measures for top-k algorithms on exact and fuzzy data sets
Top-k queries on large multi-attribute data sets are fundamental operations in information retrieval and ranking applications. In this article, we initiate research on the anytime ...
Benjamin Arai, Gautam Das, Dimitrios Gunopulos, Ni...