Sciweavers

2006 search results - page 136 / 402
» Heuristic Security-Testing Methods
Sort
View
CONSTRAINTS
2011
14 years 4 months ago
CP and IP approaches to cancer radiotherapy delivery optimization
Abstract. We consider the problem of decomposing an integer matrix into a positively weighted sum of binary matrices that have the consecutive-ones property. This problem is well-k...
Davaatseren Baatar, Natashia Boland, Sebastian Bra...
119
Voted
ICCV
2011
IEEE
14 years 24 days ago
Segmentation Fusion for Connectomics
We address the problem of automatic 3D segmentation of a stack of electron microscopy sections of brain tissue. Unlike previous efforts, where the reconstruction is usually done o...
Amelio Vazquez-Reina, Michael Gelbart, Daniel Huan...
150
Voted
AAAI
2011
14 years 23 days ago
A Functional Analysis of Historical Memory Retrieval Bias in the Word Sense Disambiguation Task
Effective access to knowledge within large declarative memory stores is one challenge in the development and understanding of long-living, generally intelligent agents. We focus o...
Nate Derbinsky, John E. Laird
141
Voted
CAIP
2011
Springer
248views Image Analysis» more  CAIP 2011»
14 years 22 days ago
Statistical Tuning of Adaptive-Weight Depth Map Algorithm
Abstract. In depth map generation, the settings of the algorithm parameters to yield an accurate disparity estimation are usually chosen empirically or based on unplanned experimen...
Alejandro Hoyos, John Congote, Iñigo Barand...
111
Voted
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
15 years 7 months ago
Efficient Video Object Segmentation by Graph-Cut
Segmentation of video objects from background is a popular computer vision problem and has many important applications. Most existing methods are either computationally expensive ...
Jinjun Wang, Wei Xu, Shenghuo Zhu, Yihong Gong