Sciweavers

2040 search results - page 211 / 408
» Approximate Expectation Maximization
Sort
View
123
Voted
ICMCS
2005
IEEE
107views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Evaluating keypoint methods for content-based copyright protection of digital images
This paper evaluates the effectiveness of keypoint methods for content-based protection of digital images. These methods identify a set of “distinctive” regions (termed keypoi...
Larry Huston, Rahul Sukthankar, Yan Ke
115
Voted
ICRA
2005
IEEE
122views Robotics» more  ICRA 2005»
15 years 9 months ago
Shape, Motion, and Parameter Estimation of Large Flexible Space Structures using Range Images
– Future space missions are expected to use robotic systems to assemble, inspect, and maintain large space structures in orbit. To carry out these tasks, robots need to know the ...
Matthew D. Lichter, Steven Dubowsky
125
Voted
ICCS
2005
Springer
15 years 9 months ago
A Computational Risk Assessment Model for Breakwaters
: In the reliability-risk assessment, the second order reliability index method and the Conditional Expectation Monte Carlo (CEMC) simulation were interrelated as a new Level III a...
Can Elmar Balas
128
Voted
IDEAL
2005
Springer
15 years 9 months ago
Differential Priors for Elastic Nets
The elastic net and related algorithms, such as generative topographic mapping, are key methods for discretized dimension-reduction problems. At their heart are priors that specify...
Miguel Á. Carreira-Perpiñán, ...
117
Voted
ATAL
2003
Springer
15 years 9 months ago
Minimizing communication cost in a distributed Bayesian network using a decentralized MDP
In complex distributed applications, a problem is often decomposed into a set of subproblems that are distributed to multiple agents. We formulate this class of problems with a tw...
Jiaying Shen, Victor R. Lesser, Norman Carver