Sciweavers

2252 search results - page 298 / 451
» Improving Random Forests
Sort
View
91
Voted
ICCV
2009
IEEE
16 years 5 months ago
Boundary Ownership by Lifting to 2.5D
This paper addresses the “boundary ownership” problem, also known as the figure/ground assignment problem. Estimating boundary ownerships is a key step in perceptual organiz...
Ido Leichter and Michael Lindenbaum
80
Voted
ICCV
2009
IEEE
16 years 5 months ago
What is the Best Multi-Stage Architecture for Object Recognition?
In many recent object recognition systems, feature extraction stages are generally composed of a filter bank, a non-linear transformation, and some sort of feature pooling layer...
Kevin Jarrett, Koray Kavukcuoglu, Marc’Aurelio R...
ICIP
2003
IEEE
16 years 2 months ago
Watermarking with knowledge of image database
The goal of this paper is to study how a-prior knowledge of the image database could be exploited for better watermarking performance. Unlike most formulations, where the encoder ...
S. Roy, E.-C. Chang
STOC
2009
ACM
139views Algorithms» more  STOC 2009»
16 years 1 months ago
Online and stochastic survivable network design
Consider the edge-connectivity survivable network design problem: given a graph G = (V, E) with edge-costs, and edgeconnectivity requirements rij Z0 for every pair of vertices i,...
Anupam Gupta, Ravishankar Krishnaswamy, R. Ravi
108
Voted
EUROCRYPT
2009
Springer
16 years 1 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir