Sciweavers

4911 search results - page 789 / 983
» Tree dependence analysis
Sort
View
85
Voted
BPM
2009
Springer
134views Business» more  BPM 2009»
15 years 7 months ago
Business Process-Based Resource Importance Determination
Abstract. Information security risk management (ISRM) heavily depends on realistic impact values representing the resources’ importance in the overall organizational context. Alt...
Stefan Fenz, Andreas Ekelhart, Thomas Neubauer
CAIP
2009
Springer
220views Image Analysis» more  CAIP 2009»
15 years 7 months ago
Rotation Invariant Texture Classification Using Binary Filter Response Pattern (BFRP)
Using statistical textons for texture classification has shown great success recently. The maximal response 8 (MR8) method, which extracts an 8-dimensional feature set from 38 filt...
Zhenhua Guo, Lei Zhang, David Zhang
CIE
2009
Springer
15 years 7 months ago
On Stateless Multicounter Machines
We investigate the computing power of stateless multicounter machines with reversal-bounded counters. Such a machine has m-counters operating on a one-way input delimited by left a...
Ömer Egecioglu, Oscar H. Ibarra
GECCO
2009
Springer
167views Optimization» more  GECCO 2009»
15 years 7 months ago
Fixed-parameter evolutionary algorithms and the vertex cover problem
In this paper, we consider multi-objective evolutionary algorithms for the Vertex Cover problem in the context of parameterized complexity. We relate the runtime of our algorithms...
Stefan Kratsch, Frank Neumann
SCIA
2009
Springer
125views Image Analysis» more  SCIA 2009»
15 years 7 months ago
Recognition of Protruding Objects in Highly Structured Surroundings by Structural Inference
Recognition of objects in highly structured surroundings is a challenging task, because the appearance of target objects changes due to fluctuations in their surroundings. This ma...
Vincent Frans van Ravesteijn, Frans M. Vos, Lucas ...