Sciweavers

4679 search results - page 831 / 936
» Modeling When Connections Are the Problem
Sort
View
DAWAK
2006
Springer
15 years 1 months ago
An Approximate Approach for Mining Recently Frequent Itemsets from Data Streams
Recently, the data stream, which is an unbounded sequence of data elements generated at a rapid rate, provides a dynamic environment for collecting data sources. It is likely that ...
Jia-Ling Koh, Shu-Ning Shin
DRM
2006
Springer
15 years 1 months ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
ECCV
2006
Springer
15 years 1 months ago
Motion Segmentation Using an Occlusion Detector
We present a novel method for the detection of motion boundaries in a video sequence based on differential properties of the spatio-temporal domain. Regarding the video sequence as...
Doron Feldman, Daphna Weinshall
EWCBR
2006
Springer
15 years 1 months ago
Case-Base Maintenance for CCBR-Based Process Evolution
The success of a company more and more depends on its ability to flexibly and quickly react to changes. Combining process management techniques and conversational case-based reason...
Barbara Weber, Manfred Reichert, Werner Wild
GECCO
2006
Springer
147views Optimization» more  GECCO 2006»
15 years 1 months ago
Deceptiveness and neutrality the ND family of fitness landscapes
When a considerable number of mutations have no effects on fitness values, the fitness landscape is said neutral. In order to study the interplay between neutrality, which exists ...
William Beaudoin, Sébastien Vérel, P...