Sciweavers

2311 search results - page 452 / 463
» Robustness and Generalization
Sort
View
JCST
2010
147views more  JCST 2010»
15 years 8 days ago
Volumetric Vector-Based Representation for Indirect Illumination Caching
Abstract This paper introduces a caching technique based on a volumetric representation that captures low-frequency indirect illumination. This structure is intended for efficient ...
Romain Pacanowski, Xavier Granier, Christophe Schl...
PETRA
2010
ACM
15 years 7 days ago
Integrating RFID on event-based hemispheric imaging for internet of things assistive applications
Automatic surveillance of a scene in a broad sense comprises one of the core modules of pervasive applications. Typically, multiple cameras are installed in an area to identify ev...
Vassilis Kolias, Ioannis Giannoukos, Christos Anag...
TMC
2010
179views more  TMC 2010»
15 years 6 days ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
138
Voted
TMI
2010
204views more  TMI 2010»
15 years 6 days ago
Camera Augmented Mobile C-Arm (CAMC): Calibration, Accuracy Study, and Clinical Applications
—Mobile C-arm is an essential tool in everyday trauma and orthopedics surgery. Minimally invasive solutions, based on X-ray imaging and coregistered external navigation created a...
Nassir Navab, Sandro Michael Heining, Jörg Tr...
CEC
2010
IEEE
14 years 12 months ago
Beating the 'world champion' evolutionary algorithm via REVAC tuning
Abstract-- We present a case study demonstrating that using the REVAC parameter tuning method we can greatly improve the `world champion' EA (the winner of the CEC2005 competi...
Selmar K. Smit, A. E. Eiben