Results 1 - 10
of
6,225
Distinctive Image Features from Scale-Invariant Keypoints
, 2003
"... This paper presents a method for extracting distinctive invariant features from images, which can be used to perform reliable matching between different images of an object or scene. The features are invariant to image scale and rotation, and are shown to provide robust matching across a a substa ..."
Abstract
-
Cited by 8955 (21 self)
- Add to MetaCart
This paper presents a method for extracting distinctive invariant features from images, which can be used to perform reliable matching between different images of an object or scene. The features are invariant to image scale and rotation, and are shown to provide robust matching across a a
Genetic Algorithms and Multiple Distinct Solutions
- University of Edinburgh
, 1993
"... A commonly encountered feature of genetic algorithms is that they tend to offer just one candidate solution to a problem. This project investigates methods to increase the number of solutions generated by genetic algorithms in the domain of simple timetabling problems. Spatial selection [Collins &am ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
numbers of solutions a simple GA run many times was found to produce more distinct solutions in a faster time than any of the specialised methods. On problems with low numbers of solutions spatial selection and tribes were found to be the most efficient at finding distinct solutions. Acknowledgements
The empirical case for two systems of reasoning
, 1996
"... Distinctions have been proposed between systems of reasoning for centuries. This article distills properties shared by many of these distinctions and characterizes the resulting systems in light of recent findings and theoretical developments. One system is associative because its computations ref ..."
Abstract
-
Cited by 669 (4 self)
- Add to MetaCart
and can simultaneously generate different solutions to a reasoning problem. The rule-based system can suppress the associative system but not completely inhibit it. The article reviews evidence in favor of the distinction and its characterization.
A Survey of Program Slicing Techniques
- JOURNAL OF PROGRAMMING LANGUAGES
, 1995
"... A program slice consists of the parts of a program that (potentially) affect the values computed at some point of interest, referred to as a slicing criterion. The task of computing program slices is called program slicing. The original definition of a program slice was presented by Weiser in 197 ..."
Abstract
-
Cited by 790 (10 self)
- Add to MetaCart
in 1979. Since then, various slightly different notions of program slices have been proposed, as well as a number of methods to compute them. An important distinction is that between a static and a dynamic slice. The former notion is computed without making assumptions regarding a program's input
A Secure Routing Protocol for Ad Hoc Networks
, 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract
-
Cited by 508 (0 self)
- Add to MetaCart
with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.
I-TCP: Indirect TCP for mobile hosts
, 1995
"... Abstract — IP-based solutions to accommodate mobile hosts within existing internetworks do not address the distinctive features of wireless mobile computing. IP-based transport protocols thus suffer from poor performance when a mobile host communicates with a host on the fixed network. This is cause ..."
Abstract
-
Cited by 614 (7 self)
- Add to MetaCart
Abstract — IP-based solutions to accommodate mobile hosts within existing internetworks do not address the distinctive features of wireless mobile computing. IP-based transport protocols thus suffer from poor performance when a mobile host communicates with a host on the fixed network
INVOLVE 3:3(2010) Distinct solution to a linear congruence
"... inv lve a journal of mathematics mathematical sciences publishers Distinct solution to a linear congruence ..."
Abstract
- Add to MetaCart
inv lve a journal of mathematics mathematical sciences publishers Distinct solution to a linear congruence
An Investigation of Sexual Selection as a Mechanism for Obtaining Multiple Distinct Solutions
, 1997
"... . The ability to obtain multiple distinct solutions in a single run is an important, though often forgotten, practical advantage of genetic algorithms, and therefore methods that enhance this ability are desirable. The approach taken here is inspired by nature: sexually reproducing organisms do not ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
. The ability to obtain multiple distinct solutions in a single run is an important, though often forgotten, practical advantage of genetic algorithms, and therefore methods that enhance this ability are desirable. The approach taken here is inspired by nature: sexually reproducing organisms do
An Analysis of the Requirements Traceability Problem
, 1993
"... In this paper1, we investigate and discuss the underlying nature of the requirements traceability problem. Our work is based on empirical studies, involving over 100 practitioners, and an evaluation of current support. We introduce the distinction between pre-requirements specification (pre-RS) trac ..."
Abstract
-
Cited by 389 (19 self)
- Add to MetaCart
In this paper1, we investigate and discuss the underlying nature of the requirements traceability problem. Our work is based on empirical studies, involving over 100 practitioners, and an evaluation of current support. We introduce the distinction between pre-requirements specification (pre
ITERATIONS CONVERGING TO DISTINCT SOLUTIONS OF SOME NONLINEAR OPERATOR EQUATIONS IN BANACH SPACE
, 1986
"... We examine the solvability of multilinear equations of the form (x,x x) y, k,-k times-where Mk is a k-linear operator on a Banach space X and y E X is fixed. ..."
Abstract
- Add to MetaCart
We examine the solvability of multilinear equations of the form (x,x x) y, k,-k times-where Mk is a k-linear operator on a Banach space X and y E X is fixed.
Results 1 - 10
of
6,225