This paper addresses the “boundary ownership” problem,
also known as the figure/ground assignment problem.
Estimating boundary ownerships is a key step in perceptual
organiz...
In many recent object recognition systems, feature extraction
stages are generally composed of a filter bank, a
non-linear transformation, and some sort of feature pooling
layer...
Kevin Jarrett, Koray Kavukcuoglu, Marc’Aurelio R...
The goal of this paper is to study how a-prior knowledge of the image database could be exploited for better watermarking performance. Unlike most formulations, where the encoder ...
Consider the edge-connectivity survivable network design problem: given a graph G = (V, E) with edge-costs, and edgeconnectivity requirements rij Z0 for every pair of vertices i,...
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...