Sciweavers

2468 search results - page 436 / 494
» A New Approach to Pseudoword Generation
Sort
View
CSREAPSC
2006
15 years 3 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
CISST
2003
83views Hardware» more  CISST 2003»
15 years 3 months ago
Computational Efficiency of Structural Image Matching
This paper addresses computational efficiency issues of a new algebraic method for imagery registration/conflation. An algebraic approach to conflation/registration of images does ...
Richard Chase, Boris Kovalerchuk
94
Voted
GRAPHICSINTERFACE
2001
15 years 3 months ago
The Rayset and Its Applications
In this paper, a novel concept, rayset, is proposed. A new image based representation, object centered concentric mosaics (OCCM), is derived based on this concept. The rayset is a...
Minglun Gong, Yee-Hong Yang
NIPS
2001
15 years 3 months ago
Unsupervised Learning of Human Motion Models
This paper presents an unsupervised learning algorithm that can derive the probabilistic dependence structure of parts of an object (a moving human body in our examples) automatic...
Yang Song, Luis Goncalves, Pietro Perona
114
Voted
IJCAI
2003
15 years 3 months ago
Approximating Optimal Policies for Agents with Limited Execution Resources
An agent with limited consumable execution resources needs policies that attempt to achieve good performance while respecting these limitations. Otherwise, an agent (such as a pla...
Dmitri A. Dolgov, Edmund H. Durfee