Sciweavers

5948 search results - page 278 / 1190
» Computing Robust Counter-Strategies
Sort
View
TMM
2010
169views Management» more  TMM 2010»
14 years 11 months ago
An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering
This paper introduces a video copy detection system which efficiently matches individual frames and then verifies their spatio-temporal consistency. The approach for matching frame...
Matthijs Douze, Herve Jegou, Cordelia Schmid
ICASSP
2011
IEEE
14 years 8 months ago
USPACOR: Universal sparsity-controlling outlier rejection
The recent upsurge of research toward compressive sampling and parsimonious signal representations hinges on signals being sparse, either naturally, or, after projecting them on a...
Georgios B. Giannakis, Gonzalo Mateos, Shahrokh Fa...
ICASSP
2011
IEEE
14 years 8 months ago
Real time speaker localization and detection system for camera steering in multiparticipant videoconferencing environments
A real time speaker localization and detection system for videoconferencing environments is presented. In this system, a recently proposed modified Steered Response Power - Phase...
Amparo Marti, Maximo Cobos, José J. L&oacut...
SBRN
2008
IEEE
15 years 10 months ago
Imitation Learning of an Intelligent Navigation System for Mobile Robots Using Reservoir Computing
The design of an autonomous navigation system for mobile robots can be a tough task. Noisy sensors, unstructured environments and unpredictability are among the problems which mus...
Eric A. Antonelo, Benjamin Schrauwen, Dirk Strooba...
CEC
2007
IEEE
15 years 10 months ago
Computational intelligence algorithms for risk-adjusted trading strategies
Abstract— This paper investigates the performance of trading strategies identified through Computational Intelligence techniques. We focus on trading rules derived by Genetic Pr...
Nicos G. Pavlidis, E. G. Pavlidis, Michael G. Epit...