Sciweavers

9425 search results - page 1594 / 1885
» Some Notes on Models and Modelling
Sort
View
133
Voted
CNL
2009
15 years 5 months ago
Rhetorical Compositions for Controlled Natural Languages
Logic-based controlled natural languages usually provide some facility for compositional representation, minimally including sentence level coordination and sometimes subordination...
Andrew Potter
ESORICS
2010
Springer
15 years 5 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
125
Voted
HPDC
2010
IEEE
15 years 5 months ago
Towards long term data quality in a large scale biometrics experiment
Quality of data plays a very important role in any scientific research. In this paper we present some of the challenges that we face in managing and maintaining data quality for a...
Hoang Bui, Diane Wright, Clarence Helm, Rachel Wit...
GECCO
2008
Springer
137views Optimization» more  GECCO 2008»
15 years 5 months ago
Rank based variation operators for genetic algorithms
We show how and why using genetic operators that are applied with probabilities that depend on the fitness rank of a genotype or phenotype offers a robust alternative to the Sim...
Jorge Cervantes, Christopher R. Stephens
133
Voted
ICMCS
2010
IEEE
210views Multimedia» more  ICMCS 2010»
15 years 5 months ago
Confidence evaluation for robust, fast-converging disparity map refinement
To improve upon the initial disparity estimates stemming from a local correspondence method, a subsequent refinement step is commonly employed. The performance of the stereo match...
Jorn Jachalsky, Markus Schlosser, Dirk Gandolph
« Prev « First page 1594 / 1885 Last » Next »