Sciweavers

919 search results - page 127 / 184
» Improved analysis methods for crossover-based algorithms
Sort
View
114
Voted
ICCS
2007
Springer
15 years 7 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...
DGCI
2006
Springer
15 years 7 months ago
Topological and Geometrical Reconstruction of Complex Objects on Irregular Isothetic Grids
In this paper, we address the problem of vectorization of binary images on irregular isothetic grids. The representation of graphical elements by lines is common in document analys...
Antoine Vacavant, David Coeurjolly, Laure Tougne
138
Voted
ECCV
2008
Springer
15 years 5 months ago
Robust Object Tracking by Hierarchical Association of Detection Responses
Abstract. We present a detection-based three-level hierarchical association approach to robustly track multiple objects in crowded environments from a single camera. At the low lev...
Chang Huang, Bo Wu, Ramakant Nevatia
202
Voted
NIPS
2008
15 years 4 months ago
Automatic online tuning for fast Gaussian summation
Many machine learning algorithms require the summation of Gaussian kernel functions, an expensive operation if implemented straightforwardly. Several methods have been proposed to...
Vlad I. Morariu, Balaji Vasan Srinivasan, Vikas C....
DAC
2004
ACM
16 years 4 months ago
Statistical optimization of leakage power considering process variations using dual-Vth and sizing
timing analysis tools to replace standard deterministic static timing analyzers whereas [8,27] develop approaches for the statistical estimation of leakage power considering within...
Ashish Srivastava, Dennis Sylvester, David Blaauw