Sciweavers

551 search results - page 97 / 111
» Preventing existence
Sort
View
95
Voted
CCS
2003
ACM
15 years 2 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
IMR
2003
Springer
15 years 2 months ago
An Adaptable Surface Parameterization Method
Parameterizations of triangulated surfaces are used in an increasing number of mesh processing applications for various purposes. Although demands vary, they are often required to...
Patrick Degener, Jan Meseth, Reinhard Klein
ISMAR
2002
IEEE
15 years 2 months ago
Practical Solutions for Calibration of Optical See-Through Devices
One of the most crucial tasks in a see-through augmented reality (AR) system is to register the virtual objects with the real world through a transparent display. The importance s...
Yakup Genc, Mihran Tuceryan, Nassir Navab
GECCO
2010
Springer
207views Optimization» more  GECCO 2010»
15 years 2 months ago
Generalized crowding for genetic algorithms
Crowding is a technique used in genetic algorithms to preserve diversity in the population and to prevent premature convergence to local optima. It consists of pairing each offsp...
Severino F. Galán, Ole J. Mengshoel
CIKM
2009
Springer
15 years 2 months ago
Improvements that don't add up: ad-hoc retrieval results since 1998
The existence and use of standard test collections in information retrieval experimentation allows results to be compared between research groups and over time. Such comparisons, ...
Timothy G. Armstrong, Alistair Moffat, William Web...