Search Results

You are looking at 1 - 10 of 43 items for :

  • Software Development x
Clear All
Open access

Konrad Siek and Paweł T. Wojciechowski

. In Proc. PPoPP’05, June 2005. [13] He, J., Hoare, C. A. R., and Sanders, J. W. Data refinement refined. In Proc. ESOP’86, 1986. [14] Herlihy, M., Luchangco, V., Moir, M., and William N. Scherer, I. Software transactional memory for dynamic-sized data structures. In Proc. PODC’03, 2003. [15] Herlihy, M. and Moss, J. E. B. Transactional memory: Architectural support for lock-free data structures. In Proc. ISCA’93, May 1993. [16] Imbs, D., de Mendivil, J. R., and Raynal, M. On the Consistency Conditions

Open access

Michał Szczepanik and Ireneusz Jóźwiak

., Govindaraju V., Cartwright E. N.(2006) K-plet and coupled bfs: A graph based fingerprint representation and matching algorithm. LNCS : 309 - 315 [5] Grzeszyk C. (1992) Forensic fingerprint examination marks . (in Polish), Wydawnictwo Centrum Szkolenia Policji, Legionowo [6] He Y., Ou Z.(2005) Fingerprint matching algorithm based on local minutiae adjacency graph, Journal of Harbin Institute of Technology 10/05, pp. 95-103 [7] Huk M., Szczepanik M. (2011) Multiple classifier error probability for multi-class problems

Open access

Łukasz Radliński

., Hall M., Speeding up logistic model tree induction, in: Proceedings of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases (PKDD’05) , Alípio Mário Jorge, Luís Torgo, Pavel Brazdil, Rui Camacho, and João Gama (Eds.). Springer-Verlag, Berlin, Heidelberg, 2005, 675-683. [38] Tang J., Chen Z., Fu A. W. C., Cheung, D. W., Enhancing Effectiveness of Outlier Detections for Low Density Patterns, in: Pacific-Asia Conf. on Knowledge Discovery and Data Mining (PAKDD) . Taipei, 2002, 535-548. [39] Vargas J.A., García-Mundo L

Open access

Agata Chmielewska, Marianna Parzych, Tomasz Marciniak and Adam Dąbrowski

Measures and an adaptive Correction Filter”, IEEE International Conference on Advanced Video and Signal Based Surveillance, pp. 19-24, 2013. [7] Heatmap tool from Cognimatics datasheet, http://www.cognimatics.com/downloads/trueview-heatmap-product-sheet.pdf , available at 2014-11-27 [8] K. Kopaczewski, M. Szczodak, A. Czyżewski, H. Krawczyk, “A method for counting people attending large public events”, Multimedia Tools and Applications, 2013 (online). DOI: 10.1007/s11042-013-1628-0 [9] C. Lijun, H. Kaiqi, “Video-based crowd density estimation and

Open access

Ayan Kumar Das, Rituparna Chaki and Kashi Nath Dey

Information Processing in Sensor Networks (IPSN’03) , Palo Alto, CA, USA, April 2003. [17] J. Douceur, The sybil attack, First International Workshop on Peer-to-Peer Systems , vol. 2429 of LNCS series, Springer, Berlin, March 2002. [18] Jing Deng, Richard Han, Shivakant Mishra, INSENS: Intrusion-tolerant routing for wireless sensor networks, Computer Communications, Elsevier , Vol. 29, Issue 2, DOI: 10.1016/j.comcom.2005.05.018,2006, pp.216–230. [19] Karkazis, P., Leligou, H.C., Orphanoudakis, T., Zahariadis, T., Geographical routing in wireless sensor

Open access

Daniel Koguciuk

, 24(6):381–395, June 1981. [7] Hänsch R., Weber T., and Hellwich O. Comparison of 3D interest point detectors and descriptors for point cloud fusion. ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences , pages 57–64, Aug. 2014. [8] Hartley R. and Zisserman A. Multiple view geometry in computer vision . Cambridge University Press, Cambridge, 2003. Choix de documents en appendice. [9] Heuros 3D object recognition system. https://bitbucket.org/rrgwut/heuros . Accessed: 04-05-2015. [10] Izadi S., Kim D., Hilliges O

Open access

Chang Su, Yue Yu, Xianzhong Xie and Yukun Wang

services, ACM Transactions on Intelligent Systems and Technology (TIST) , 4 , 1, 2013, 10. [4] Blondel V D., Guillaume J L., Lambiotte R., Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment , 10, 2008, 10008. [5] Breese J.S., Heckerman D., Kadie C., Empirical analysis of predictive algorithms for collaborative filtering. Proceedings of the Fourteenth conference on Uncertainty in artificial intelligence Morgan Kaufmann Publishers Inc ., 1998: 43-52. [6] Balabanović M., Shoham Y., Fab: content

Open access

Szymon Wasik

. [3] Bae J. A., Mu S., Kim J. S., Turner N. L., Tartavull I., Kemnitz N., Jordan C. S., Norton A. D., Silversmith W. M., Prentki R., et al. Digital museum of retinal ganglion cells with dense anatomy and physiology. bioRxiv, page 182758, 2018. [4] Barone J., Bayer C., Copley R., Barlow N., Burns M., Rao S., Seelig G., Popovic Z., Cooper S., and Players N. Nanocrafter: Design and evaluation of a dna nanotechnology game. In Proceedings of the 10th International Conference on the Foundations of Digital Games, pages 1{5, 2015. [5] Barrett

Open access

Marcin Adamski, Krzysztof Kurowski, Marek Mika, Wojciech Piątek and Jan Węglarz

References [1] Aberer K. and Despotovic Z., Managing Trust in a Peer-2-Peer Information System, in Proceedings of the Ninth International Conference on Information and Knowledge Management, 2001. [2] Adamski M., Kulczewski M., Kurowski K., Nabrzyski J., Hume A. C., Security and performance enhancements to OGSA-DAI for Grid data virtualization, Concurrency and Computation Practice and Experience, vol. 19, no.16, p. 2171-2182, November 2007. [3] Alunkal B., Veljkovic I., von Laszewski G., and Amin K., Reputation

Open access

Krzysztof Krawiec and Paweł Liskowski

of Lecture Notes in Computer Science, pages 316-325, Prague, Czech Republic, 2001. Springer. [9] Fortin F.-A., De Rainville F.-M., Gardner M.-A., Parizeau M., and Gagné C. DEAP: Evolutionary algorithms made easy. Journal of Machine Learning Research, 13:2171-2175, jul 2012. [10] Gonçalves I., Silva S., Melo J. B., and Carreiras J. M. Random sampling technique for overfitting control in genetic programming. In Genetic Programming, pages 218-229. Springer, 2012. [11] Helmuth T., Spector L., and Matheson J. Solving