Sciweavers

3135 search results - page 390 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
ICPR
2008
IEEE
15 years 11 months ago
Computational approaches for real-time extraction of soft biometrics
Soft biometrics, as a prescreening filter, contribute to a much smaller candidate pool and allow the overall query to perform better and faster. In this paper, we focus on the eff...
Yang Ran, Gavin Rosenbush, Qinfen Zheng
IEEESCC
2008
IEEE
15 years 11 months ago
Byzantine Fault Tolerant Coordination for Web Services Business Activities
In this paper, we present a comprehensive study on the threats towards the coordination services for Web services business activities and explore the most optimal solution to miti...
Wenbing Zhao, Honglei Zhang
ICMCS
2006
IEEE
120views Multimedia» more  ICMCS 2006»
15 years 10 months ago
SVM-Based Shot Boundary Detection with a Novel Feature
This paper describes our new algorithm for shot boundary detection and its evaluation. We adopt a 2-stage data fusion approach with SVM technique to decide whether a boundary exis...
Kazunori Matsumoto, Masaki Naito, Keiichiro Hoashi...
148
Voted
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 8 months ago
Inference of genetic networks using S-system: information criteria for model selection
In this paper we present an evolutionary approach for inferring the structure and dynamics in gene circuits from observed expression kinetics. For representing the regulatory inte...
Nasimul Noman, Hitoshi Iba
132
Voted
GECCO
2006
Springer
157views Optimization» more  GECCO 2006»
15 years 8 months ago
How randomized search heuristics find maximum cliques in planar graphs
Surprisingly, general search heuristics often solve combinatorial problems quite sufficiently, although they do not outperform specialized algorithms. Here, the behavior of simple...
Tobias Storch