• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,225
Next 10 →

Distinctive Image Features from Scale-Invariant Keypoints

by David G. Lowe , 2003
"... This paper presents a method for extracting distinctive invariant features from images, which can be used to perform reliable matching between different images of an object or scene. The features are invariant to image scale and rotation, and are shown to provide robust matching across a a substa ..."
Abstract - Cited by 8955 (21 self) - Add to MetaCart
This paper presents a method for extracting distinctive invariant features from images, which can be used to perform reliable matching between different images of an object or scene. The features are invariant to image scale and rotation, and are shown to provide robust matching across a a

Genetic Algorithms and Multiple Distinct Solutions

by Patrick Alasdair Turner - University of Edinburgh , 1993
"... A commonly encountered feature of genetic algorithms is that they tend to offer just one candidate solution to a problem. This project investigates methods to increase the number of solutions generated by genetic algorithms in the domain of simple timetabling problems. Spatial selection [Collins &am ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
numbers of solutions a simple GA run many times was found to produce more distinct solutions in a faster time than any of the specialised methods. On problems with low numbers of solutions spatial selection and tribes were found to be the most efficient at finding distinct solutions. Acknowledgements

The empirical case for two systems of reasoning

by Steven A. Sloman , 1996
"... Distinctions have been proposed between systems of reasoning for centuries. This article distills properties shared by many of these distinctions and characterizes the resulting systems in light of recent findings and theoretical developments. One system is associative because its computations ref ..."
Abstract - Cited by 669 (4 self) - Add to MetaCart
and can simultaneously generate different solutions to a reasoning problem. The rule-based system can suppress the associative system but not completely inhibit it. The article reviews evidence in favor of the distinction and its characterization.

A Survey of Program Slicing Techniques

by F. Tip - JOURNAL OF PROGRAMMING LANGUAGES , 1995
"... A program slice consists of the parts of a program that (potentially) affect the values computed at some point of interest, referred to as a slicing criterion. The task of computing program slices is called program slicing. The original definition of a program slice was presented by Weiser in 197 ..."
Abstract - Cited by 790 (10 self) - Add to MetaCart
in 1979. Since then, various slightly different notions of program slices have been proposed, as well as a number of methods to compute them. An important distinction is that between a static and a dynamic slice. The former notion is computed without making assumptions regarding a program's input

A Secure Routing Protocol for Ad Hoc Networks

by Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer , 2002
"... Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In light of these threats, we identify three different environments with distin ..."
Abstract - Cited by 508 (0 self) - Add to MetaCart
with distinct security requirements. We propose a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected. Our protocol, ARAN, is based on certificates and successfully defeats all identified attacks.

I-TCP: Indirect TCP for mobile hosts

by Ajay Bakre, B. R. Badrinath , 1995
"... Abstract — IP-based solutions to accommodate mobile hosts within existing internetworks do not address the distinctive features of wireless mobile computing. IP-based transport protocols thus suffer from poor performance when a mobile host communicates with a host on the fixed network. This is cause ..."
Abstract - Cited by 614 (7 self) - Add to MetaCart
Abstract — IP-based solutions to accommodate mobile hosts within existing internetworks do not address the distinctive features of wireless mobile computing. IP-based transport protocols thus suffer from poor performance when a mobile host communicates with a host on the fixed network

INVOLVE 3:3(2010) Distinct solution to a linear congruence

by Donald Adams, Vadim Ponomarenko, Donald Adams, Vadim Ponomarenko, Communicated Scott Chapman
"... inv lve a journal of mathematics mathematical sciences publishers Distinct solution to a linear congruence ..."
Abstract - Add to MetaCart
inv lve a journal of mathematics mathematical sciences publishers Distinct solution to a linear congruence

An Investigation of Sexual Selection as a Mechanism for Obtaining Multiple Distinct Solutions

by Michael Ratford, Andrew Tuson, Henry Thompson , 1997
"... . The ability to obtain multiple distinct solutions in a single run is an important, though often forgotten, practical advantage of genetic algorithms, and therefore methods that enhance this ability are desirable. The approach taken here is inspired by nature: sexually reproducing organisms do not ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
. The ability to obtain multiple distinct solutions in a single run is an important, though often forgotten, practical advantage of genetic algorithms, and therefore methods that enhance this ability are desirable. The approach taken here is inspired by nature: sexually reproducing organisms do

An Analysis of the Requirements Traceability Problem

by Orlena C. Z. Gotel, Anthony C. W. Finkelstein , 1993
"... In this paper1, we investigate and discuss the underlying nature of the requirements traceability problem. Our work is based on empirical studies, involving over 100 practitioners, and an evaluation of current support. We introduce the distinction between pre-requirements specification (pre-RS) trac ..."
Abstract - Cited by 389 (19 self) - Add to MetaCart
In this paper1, we investigate and discuss the underlying nature of the requirements traceability problem. Our work is based on empirical studies, involving over 100 practitioners, and an evaluation of current support. We introduce the distinction between pre-requirements specification (pre

ITERATIONS CONVERGING TO DISTINCT SOLUTIONS OF SOME NONLINEAR OPERATOR EQUATIONS IN BANACH SPACE

by Ioannis K. Argyros , 1986
"... We examine the solvability of multilinear equations of the form (x,x x) y, k,-k times-where Mk is a k-linear operator on a Banach space X and y E X is fixed. ..."
Abstract - Add to MetaCart
We examine the solvability of multilinear equations of the form (x,x x) y, k,-k times-where Mk is a k-linear operator on a Banach space X and y E X is fixed.
Next 10 →
Results 1 - 10 of 6,225
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University