Sciweavers

1248 search results - page 42 / 250
» The I Test
Sort
View
IEEEARES
2007
IEEE
15 years 5 months ago
Reliability Markov Chains for Security Data Transmitter Analysis
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Calin Ciufudean, Bianca Satco, Constantin Filote
GECCO
2007
Springer
167views Optimization» more  GECCO 2007»
15 years 5 months ago
Genetically designed heuristics for the bin packing problem
The bin packing problem (BPP) is a real-world problem that arises in different industrial applications related to minimization of space or time. The aim of this research is to au...
Oana Muntean
CCS
2007
ACM
15 years 5 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
JGAA
2008
97views more  JGAA 2008»
14 years 11 months ago
Drawing Bipartite Graphs on Two Parallel Convex Curves
Let G be a bipartite graph, and let e, i be two parallel convex curves; we study the question about whether G admits a planar straight-line drawing such that the vertices of one p...
Emilio Di Giacomo, Luca Grilli, Giuseppe Liotta
81
Voted
ICPR
2004
IEEE
16 years 11 days ago
Discriminative Distance Measures for Image Matching
: Significant progress has been made by the computer vision community in recent years along two fronts: (i) developing complex spatial-temporal models for object registration and t...
Tat-Jen Cham, Xi Chen