Sciweavers

24188 search results - page 462 / 4838
» Computing on Encrypted Data
Sort
View
MEMICS
2010
14 years 12 months ago
Efficient Computation of Morphological Greyscale Reconstruction
Morphological reconstruction is an important image operator from mathematical morphology. It is very often used for filtering, segmentation, and feature extraction. However, its c...
Pavel Karas
VIS
2007
IEEE
120views Visualization» more  VIS 2007»
16 years 6 months ago
Efficient Computation of Morse-Smale Complexes for Three-dimensional Scalar Functions
The Morse-Smale complex is an efficient representation of the gradient behavior of a scalar function, and critical points paired by the complex identify topological features and th...
Attila Gyulassy, Vijay Natarajan, Valerio Pascuc...
IWINAC
2009
Springer
15 years 11 months ago
Eye-Hand Coordination for Reaching in Dorsal Stream Area V6A: Computational Lessons
Data related to the coordination and modulation between visual information, gaze direction and arm reaching movements in primates are analyzed from a computational point of view. T...
Eris Chinellato, Beata Grzyb, Nicoletta Marzocchi,...
ICANN
2007
Springer
15 years 11 months ago
Event Detection and Localization in Mobile Robot Navigation Using Reservoir Computing
Abstract. Reservoir Computing (RC) uses a randomly created recurrent neural network where only a linear readout layer is trained. In this work, RC is used for detecting complex eve...
Eric A. Antonelo, Benjamin Schrauwen, Xavier Dutoi...
155
Voted
SYNASC
2005
IEEE
130views Algorithms» more  SYNASC 2005»
15 years 10 months ago
Natural Computation for Business Intelligence from Web Usage Mining
Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical ...
Ajith Abraham