Sciweavers

3135 search results - page 479 / 627
» Localization Algorithms: Performance Evaluation and Reliabil...
Sort
View
91
Voted
ICC
2008
IEEE
133views Communications» more  ICC 2008»
15 years 10 months ago
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks
—The recent surge of peer-to-peer (P2P) networks consisting of thousands of of hosts makes them a breeding ground for malware proliferation. Although some existing studies have s...
Xuhua Ding, Wei Yu, Ying Pan
ICPR
2008
IEEE
15 years 10 months ago
Retinal vessel tree segmentation using a deformable contour model
This paper presents an improved version of our specific methodology to detect the vessel tree in retinal angiographies. The automatic analysis of retinal vessel tree facilitates ...
Lucia Espona, María J. Carreira, Manuel Fra...
GECCO
2009
Springer
146views Optimization» more  GECCO 2009»
15 years 10 months ago
Analyzing the landscape of a graph based hyper-heuristic for timetabling problems
Hyper-heuristics can be thought of as “heuristics to choose heuristics”. They are concerned with adaptively finding solution methods, rather than directly producing a solutio...
Gabriela Ochoa, Rong Qu, Edmund K. Burke
145
Voted
BMCBI
2006
116views more  BMCBI 2006»
15 years 4 months ago
Integrative missing value estimation for microarray data
Background: Missing value estimation is an important preprocessing step in microarray analysis. Although several methods have been developed to solve this problem, their performan...
Jianjun Hu, Haifeng Li, Michael S. Waterman, Xiang...
SMI
2008
IEEE
255views Image Analysis» more  SMI 2008»
15 years 10 months ago
GPU-accelerated surface denoising and morphing with lattice Boltzmann scheme
In this paper, we introduce a parallel numerical scheme, the lattice Boltzmann method, to shape modeling applications. The motivation of using this originally-designed fluid dyna...
Ye Zhao