Sciweavers

1088 search results - page 140 / 218
» A Bayesian Approach to Tackling Hard Computational Problems
Sort
View
JCS
2008
93views more  JCS 2008»
14 years 11 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
GECCO
2007
Springer
160views Optimization» more  GECCO 2007»
15 years 5 months ago
Self-modifying cartesian genetic programming
In nature, systems with enormous numbers of components (i.e. cells) are evolved from a relatively small genotype. It has not yet been demonstrated that artificial evolution is su...
Simon Harding, Julian Francis Miller, Wolfgang Ban...
ICCV
2007
IEEE
16 years 1 months ago
A Study of Face Recognition as People Age
In this paper we study face recognition across ages within a real passport photo verification task. First, we propose using the gradient orientation pyramid for this task. Discard...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
75
Voted
GPEM
2008
98views more  GPEM 2008»
14 years 11 months ago
Sporadic model building for efficiency enhancement of the hierarchical BOA
Efficiency enhancement techniques--such as parallelization and hybridization--are among the most important ingredients of practical applications of genetic and evolutionary algori...
Martin Pelikan, Kumara Sastry, David E. Goldberg
CVPR
2010
IEEE
15 years 7 months ago
Disambiguating Visual Relations Using Loop Constraints
Repetitive and ambiguous visual structures in general pose a severe problem in many computer vision applications. Identification of incorrect geometric relations between images s...
Christopher Zach, Manfred Klopschitz, Marc Pollefe...