Sciweavers

1717 search results - page 268 / 344
» On the analysis of the (1 1) memetic algorithm
Sort
View
TIT
2010
146views Education» more  TIT 2010»
14 years 4 months ago
Information propagation speed in mobile and delay tolerant networks
Abstract--The goal of this paper is to increase our understanding of the fundamental performance limits of mobile and Delay Tolerant Networks (DTNs), where end-to-end multi-hop pat...
Philippe Jacquet, Bernard Mans, Georgios Rodolakis
JASIS
2011
110views more  JASIS 2011»
14 years 22 days ago
A material history of bits
In both the popular press and scholarly research, digital information is persistently discussed in terms that imply its immateriality. In this characterization, the digital derive...
Jean-François Blanchette
JCDL
2011
ACM
374views Education» more  JCDL 2011»
14 years 22 days ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
CVPR
2012
IEEE
13 years 8 days ago
Center-Shift: An approach towards automatic robust mesh segmentation (ARMS)
In the area of 3D shape analysis, research in mesh segmentation has always been an important topic, as it is a fundamental low-level task which can be utilized in many application...
Mengtian Sun, Yi Fang, Karthik Ramani
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
13 years 8 days ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su