Sciweavers

2598 search results - page 365 / 520
» The Abstract Immune System Algorithm
Sort
View
131
Voted
NETWORKS
2011
14 years 9 months ago
Line planning, path constrained network flow and inapproximability
Abstract. We consider a basic subproblem which arises in line planning, and is of particular importance in the context of a high system load or robustness: How much can be routed m...
Christina Büsing, Sebastian Stiller
96
Voted
ICFHR
2010
139views Biometrics» more  ICFHR 2010»
14 years 9 months ago
A Comparative Evaluation of Finger-Drawn Graphical Password Verification Methods
Abstract--Doodle-based graphical passwords represent a challenging scenario due to their high variability and the tendency to be graphically simple. Despite this, doodle-based auth...
Marcos Martinez-Diaz, C. Martin-Diaz, Javier Galba...
144
Voted
CLEF
2011
Springer
14 years 2 months ago
Intrinsic Plagiarism Detection Using Character Trigram Distance Scores - Notebook for PAN at CLEF 2011
Abstract In this paper, we describe a novel approach to intrinsic plagiarism detection. Each suspicious document is divided into a series of consecutive, potentially overlapping â€...
Mike Kestemont, Kim Luyckx, Walter Daelemans
126
Voted
CORR
2012
Springer
229views Education» more  CORR 2012»
13 years 10 months ago
Resource Allocation with Subcarrier Pairing in OFDMA Two-Way Relay Networks
Abstract—This study considers an orthogonal frequencydivision multiple-access (OFDMA)-based multi-user two-way relay network where multiple mobile stations (MSs) communicate with...
Hao Zhang, Yuan Liu, Meixia Tao
138
Voted
APIN
1998
107views more  APIN 1998»
15 years 2 months ago
Multiple Adaptive Agents for Tactical Driving
Abstract. Recent research in automated highway systems has ranged from low-level vision-based controllers to high-level route-guidance software. However, there is currently no syst...
Rahul Sukthankar, Shumeet Baluja, John Hancock