Sciweavers

1507 search results - page 272 / 302
» Separating Complexity Classes Using Structural Properties
Sort
View
ENTCS
2007
110views more  ENTCS 2007»
14 years 11 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone
ENTCS
2007
121views more  ENTCS 2007»
14 years 11 months ago
Incremental Parametric Development of Greedy Algorithms
The event B method provides a general framework for modelling both data structures and algorithms. B models are validated by discharging proof obligations ensuring safety properti...
Dominique Cansell, Dominique Méry
ALIFE
2000
14 years 11 months ago
Pattern Formation and Optimization in Army Ant Raids
Army ant colonies display complex foraging raid patterns involving thousands of individuals communicating through chemical trails. In this article we explore, by means of a simple ...
Ricard V. Solé, Eric Bonabeau, Jordi Delgad...
94
Voted
CVPR
2011
IEEE
14 years 2 months ago
Visual textures as realizations of multivariate log-Gaussian Cox processes
In this paper, we address invariant keypoint-based texture characterization and recognition. Viewing keypoint sets associated with visual textures as realizations of point process...
Huu-Giao Nguyen, Ronan Fablet, Jean-Marc Boucher
MICRO
2009
IEEE
168views Hardware» more  MICRO 2009»
15 years 5 months ago
Ordering decoupled metadata accesses in multiprocessors
Hardware support for dynamic analysis can minimize the performance overhead of useful applications such as security checks, debugging, and profiling. To eliminate implementation ...
Hari Kannan