Sciweavers

1997 search results - page 113 / 400
» On the convergence of Hill's method
Sort
View
AVSS
2006
IEEE
15 years 7 months ago
Activity Topology Estimation for Large Networks of Cameras
Estimating the paths that moving objects can take through the fields of view of possibly non-overlapping cameras, also known as their activity topology, is an important step in t...
Anton van den Hengel, Anthony R. Dick, Rhys Hill
ATAL
2005
Springer
15 years 6 months ago
From concepts to agents: towards a framework for multi-agent system modelling
Whilst tools assist the various tasks required to develop a multi-agent system (MAS), yet there still remains a gap between the generation of MAS models and program code. AUML dev...
Richard Hill, Simon Polovina, Martin D. Beer
ACSAC
2002
IEEE
15 years 6 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
GECCO
2010
Springer
196views Optimization» more  GECCO 2010»
15 years 6 months ago
Using synthetic test suites to empirically compare search-based and greedy prioritizers
The increase in the complexity of modern software has led to the commensurate growth in the size and execution time of the test suites for these programs. In order to address this...
Zachary D. Williams, Gregory M. Kapfhammer
FPCA
1989
15 years 5 months ago
F-Bounded Polymorphism for Object-Oriented Programming
Bounded quantification was introduced by Cardelli and Wegner as a means of typing functions that operate uniformly over all subtypes of a given type. They defined a simple “ob...
Peter S. Canning, William R. Cook, Walter L. Hill,...