Sciweavers

1529 search results - page 75 / 306
» A slant removal algorithm
Sort
View
AAAI
1990
14 years 11 months ago
Tree Decomposition with Applications to Constraint Processing
This paper concerns the task of removing redundant information from a given knowledge base, and restructuring it in the form of a tree, so as to admit efficient problem solving ro...
Itay Meiri, Judea Pearl, Rina Dechter
ICASSP
2011
IEEE
14 years 1 months ago
Enhancement of uneven lighting text image using line-based Empirical Mode Decomposition
Non-uniform light distribution problems often arise in the text images taken by digital camera. In this paper, we propose a novel technique for text image uneven lighting removal ...
Soo-Chang Pei, Mary Tzeng, Yu-Zhe Hsiao
ALIFE
2011
14 years 1 months ago
Interactive Evolution of Camouflage
This paper presents an abstract computation model of the evolution of camouflage in nature. The 2d model uses evolved textures for prey, a background texture representing the envi...
Craig Reynolds
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
13 years 13 days ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
PAMI
2012
13 years 13 days ago
Image Restoration by Matching Gradient Distributions
—The restoration of a blurry or noisy image is commonly performed with a MAP estimator, which maximizes a posterior probability to reconstruct a clean image from a degraded image...
Taeg Sang Cho, Charles Lawrence Zitnick, Neel Josh...