Sciweavers

976 search results - page 170 / 196
» Evaluating Adversarial Partitions
Sort
View
194
Voted
CRV
2011
IEEE
337views Robotics» more  CRV 2011»
13 years 10 months ago
Object Detection Using Principal Contour Fragments
Abstract—Contour features play an important role in object recognition. Psychological experiments have shown that maximum-curvature points are most distinctive along a contour [6...
Changhai Xu, Benjamin Kuipers
ETS
2011
IEEE
224views Hardware» more  ETS 2011»
13 years 10 months ago
AVF Analysis Acceleration via Hierarchical Fault Pruning
—The notion of Architectural Vulnerability Factor (AVF) has been extensively used by designers to evaluate various aspects of design robustness. While AVF is a very accurate way ...
Michail Maniatakos, Chandra Tirumurti, Abhijit Jas...
104
Voted
HPCA
2012
IEEE
13 years 5 months ago
Decoupled dynamic cache segmentation
The least recently used (LRU) replacement policy performs poorly in the last-level cache (LLC) because temporal locality of memory accesses is filtered by first and second level...
Samira Manabi Khan, Zhe Wang, Daniel A. Jimé...
102
Voted
CVPR
2012
IEEE
13 years 19 days ago
Exploiting local and global patch rarities for saliency detection
We introduce a saliency model based on two key ideas. The first one is considering local and global image patch rarities as two complementary processes. The second one is based o...
Ali Borji, Laurent Itti
102
Voted
CVPR
2012
IEEE
13 years 19 days ago
A fast nearest neighbor search algorithm by nonlinear embedding
We propose an efficient algorithm to find the exact nearest neighbor based on the Euclidean distance for largescale computer vision problems. We embed data points nonlinearly on...
Yoonho Hwang, Bohyung Han, Hee-Kap Ahn