Sciweavers

4761 search results - page 790 / 953
» Generalizing Boundary Points
Sort
View
ICITS
2009
14 years 10 months ago
Cryptanalysis of Secure Message Transmission Protocols with Feedback
In the context of secure point-to-point message transmission in networks with minimal connectivity, previous studies showed that feedbacks from the receiver to the sender can be us...
Qiushi Yang, Yvo Desmedt
ICWS
2009
IEEE
14 years 10 months ago
A Flexible Approach for Automatic Process Decentralization Using Dependency Tables
Web service paradigm and related technologies have provided favorable means for the realization of collaborative business processes. From both conceptual and implementation points...
Walid Fdhila, Ustun Yildiz, Claude Godart
ALGORITHMS
2010
113views more  ALGORITHMS 2010»
14 years 10 months ago
A Complete Theory of Everything (Will Be Subjective)
Increasingly encompassing models have been suggested for our world. Theories range from generally accepted to increasingly speculative to apparently bogus. The progression of theo...
Marcus Hutter
106
Voted
CORR
2010
Springer
114views Education» more  CORR 2010»
14 years 10 months ago
On the Impact of Mutation-Selection Balance on the Runtime of Evolutionary Algorithms
The interplay between the mutation operator and the selection mechanism plays a fundamental role in the behaviour of evolutionary algorithms (EAs). However, this interplay is stil...
Per Kristian Lehre, Xin Yao
110
Voted
ACCV
2010
Springer
14 years 7 months ago
A Convex Image Segmentation: Extending Graph Cuts and Closed-Form Matting
Abstract. Image matting and segmentation are two closely related topics that concern extracting the foreground and background of an image. While the methods based on global optimiz...
Youngjin Park, Suk I. Yoo