Sciweavers

886 search results - page 140 / 178
» Generalized Bezout Identity
Sort
View
SIMUTOOLS
2008
15 years 2 months ago
Simulation of ad hoc networks: ns-2 compared to JiST/SWANS
For the evaluation of ad hoc network protocols, researchers traditionally use simulations because they easily allow for a large number of nodes and reproducible environment condit...
Elmar Schoch, Michael Feiri, Frank Kargl, Michael ...
RIAO
2000
15 years 2 months ago
Speaker change detection using joint audio-visual statistics
In this paper, we present an approach for speaker change detection in broadcast video using joint audio-visual scene change statistics. Our experiments indicate that using joint a...
Giridharan Iyengar, Chalapathy Neti, Sankar Basu
TAMODIA
2007
15 years 2 months ago
Exploring Usability Needs by Human-Computer Interaction Patterns
Abstract. Covering quality aspects such as usability through the software development life cycle is challenging. These “-ilities” are generally difficult to grasp and usually ...
Markus Specker, Ina Wentzlaff
ATAL
2010
Springer
15 years 2 months ago
Pure Nash equilibria: complete characterization of hard and easy graphical games
We consider the computational complexity of pure Nash equilibria in graphical games. It is known that the problem is NP-complete in general, but tractable (i.e., in P) for special...
Albert Xin Jiang, MohammadAli Safari
GECCO
2010
Springer
186views Optimization» more  GECCO 2010»
15 years 2 months ago
Genetic rule extraction optimizing brier score
Most highly accurate predictive modeling techniques produce opaque models. When comprehensible models are required, rule extraction is sometimes used to generate a transparent mod...
Ulf Johansson, Rikard König, Lars Niklasson