Sciweavers

4620 search results - page 97 / 924
» Comparing Object Encodings
Sort
View
157
Voted
JSAC
2008
124views more  JSAC 2008»
15 years 2 months ago
On the design of globally optimal communication strategies for real-time noisy communication systems with noisy feedback
Abstract--A real-time communication system with noisy feedback is considered. The system consists of a Markov source, forward and backward discrete memoryless channels, and a recei...
Aditya Mahajan, Demosthenis Teneketzis
125
Voted
JANCL
2002
66views more  JANCL 2002»
15 years 2 months ago
Reasoning Credulously and skeptically within a single extension
Consistency-based approaches in nonmonotonic reasoning may be expected to yield multiple sets of default conclusions for a given default theory. Reasoning about such extensions is ...
James P. Delgrande, Torsten Schaub
GECCO
2005
Springer
132views Optimization» more  GECCO 2005»
15 years 8 months ago
Greedy, genetic, and greedy genetic algorithms for the quadratic knapsack problem
Augmenting an evolutionary algorithm with knowledge of its target problem can yield a more effective algorithm, as this presentation illustrates. The Quadratic Knapsack Problem e...
Bryant A. Julstrom
ECCV
2008
Springer
16 years 4 months ago
View Synthesis for Recognizing Unseen Poses of Object Classes
Abstract. An important task in object recognition is to enable algorithms to categorize objects under arbitrary poses in a cluttered 3D world. A recent paper by Savarese & Fei-...
Silvio Savarese, Fei-Fei Li 0002
156
Voted
ICIP
2003
IEEE
16 years 4 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo