Sciweavers

1687 search results - page 198 / 338
» Which pointer analysis should I use
Sort
View
132
Voted
IEAAIE
1999
Springer
15 years 8 months ago
Knowledge Acquisition Based on Semantic Balance of Internal and External Knowledge
This paper presents a strategy to handle incomplete knowledge during acquisition process. The goal of this research is to develop formal tools that benefit the law of semantic bala...
Vagan Y. Terziyan, Seppo Puuronen
139
Voted
WSC
2008
15 years 7 months ago
How to build valid and credible simulation models
In this tutorial we present techniques for building valid and credible simulation models. Ideas to be discussed include the importance of a definitive problem formulation, discuss...
Averill M. Law
BIOID
2008
157views Biometrics» more  BIOID 2008»
15 years 6 months ago
Modeling Marginal Distributions of Gabor Coefficients: Application to Biometric Template Reduction
Abstract. Gabor filters have demonstrated their effectiveness in automatic face recognition. However, one drawback of Gabor-based face representations is the huge amount of data th...
Daniel González-Jiménez, José...
225
Voted
VCIP
2003
238views Communications» more  VCIP 2003»
15 years 6 months ago
Texture segmentation based on features in wavelet domain for image retrieval
Texture is a fundamental feature which provides significant information for image classification, and is an important content used in content-based image retrieval (CBIR) system. ...
Ying Liu, Si Wu, Xiaofang Zhou
FOGA
1994
15 years 5 months ago
The Schema Theorem and Price's Theorem
Holland's Schema Theorem is widely taken to be the foundation for explanations of the power of genetic algorithms (GAs). Yet some dissent has been expressed as to its implica...
Lee Altenberg