Sciweavers

3073 search results - page 186 / 615
» Real World Verification
Sort
View
IPC
2007
IEEE
15 years 11 months ago
Design and Validation of a Low-Power Network Node for Pervasive Applications
Pervasive computing refers to making many computing devices available throughout the physical environment, while making them effectively invisible to the user. To further increase...
Juan-Carlos Cano, Carlos Miguel Tavares Calafate, ...
ISMAR
2007
IEEE
15 years 11 months ago
Interactive Focus and Context Visualization for Augmented Reality
In this article we present interactive Focus and Context (F+C) visualizations for Augmented Reality (AR) applications. We demonstrate how F+C visualizations are used to affect the...
Denis Kalkofen, Erick Méndez, Dieter Schmal...
AUSAI
2007
Springer
15 years 11 months ago
The Detrimentality of Crossover
The traditional concept of a genetic algorithm (GA) is that of selection, crossover and mutation. However, a limited amount of data from the literature has suggested that the nich...
Andrew Czarn, Cara MacNish, Kaipillil Vijayan, Ber...
157
Voted
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
15 years 11 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang
ECML
2007
Springer
15 years 11 months ago
Avoiding Boosting Overfitting by Removing Confusing Samples
Boosting methods are known to exhibit noticeable overfitting on some datasets, while being immune to overfitting on other ones. In this paper we show that standard boosting algorit...
Alexander Vezhnevets, Olga Barinova