Sciweavers

1146 search results - page 122 / 230
» Evaluation of modeling techniques for agent-based systems
Sort
View
TIP
2010
108views more  TIP 2010»
14 years 11 months ago
Image Reconstruction Using Particle Filters and Multiple Hypotheses Testing
Abstract—In this paper, we introduce a reconstruction framework that explicitly accounts for image geometry when defining the spatial interaction between pixels in the filterin...
Noura Azzabou, Nikos Paragios, Frederic Guichard
ISORC
2005
IEEE
15 years 6 months ago
Object-Reuse for More Predictable Real-Time Java Behavior
One of the problems with Java for real-time systems is the unpredictable behavior of garbage collection (GC). GC introduces unexpected load and causes undesirable delays for real-...
Jameela Al-Jaroodi, Nader Mohamed
105
Voted
CIKM
2004
Springer
15 years 6 months ago
A framework for selective query expansion
Query expansion is a well-known technique that has been shown to improve average retrieval performance. This technique has not been used in many operational systems because of the...
Stephen Cronen-Townsend, Yun Zhou, W. Bruce Croft
ICMI
2010
Springer
196views Biometrics» more  ICMI 2010»
14 years 10 months ago
Component-based high fidelity interactive prototyping of post-WIMP interactions
In order to support interactive high-fidelity prototyping of postWIMP user interactions, we propose a multi-fidelity design method based on a unifying component-based model and su...
Jean-Yves Lionel Lawson, Mathieu Coterot, Cyril Ca...
80
Voted
SRDS
2006
IEEE
15 years 6 months ago
How To Safeguard Your Sensitive Data
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to desig...
Bob Mungamuru, Hector Garcia-Molina, Subhasish Mit...