Sciweavers

3084 search results - page 535 / 617
» Learning to Take Actions
Sort
View
SIAMCOMP
2011
14 years 4 months ago
Black-Box Constructions of Protocols for Secure Computation
In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
Iftach Haitner, Yuval Ishai, Eyal Kushilevitz, Yeh...
PLDI
2011
ACM
14 years 22 days ago
The tao of parallelism in algorithms
For more than thirty years, the parallel programming community has used the dependence graph as the main abstraction for reasoning about and exploiting parallelism in “regularâ€...
Keshav Pingali, Donald Nguyen, Milind Kulkarni, Ma...
CVPR
2009
IEEE
2216views Computer Vision» more  CVPR 2009»
16 years 5 months ago
Object Detection using a Max-Margin Hough Transform
We present a discriminative Hough transform based ob- ject detector where each local part casts a weighted vote for the possible locations of the object center. We show that the ...
Subhransu Maji (University of California, Berkeley...
CVPR
2005
IEEE
15 years 12 months ago
Concurrent Subspaces Analysis
A representative subspace is significant for image analysis, while the corresponding techniques often suffer from the curse of dimensionality dilemma. In this paper, we propose a ...
Dong Xu, Shuicheng Yan, Lei Zhang, HongJiang Zhang...
CVPR
2006
IEEE
15 years 12 months ago
Shape-Based Approach to Robust Image Segmentation using Kernel PCA
Segmentation involves separating an object from the background. In this work, we propose a novel segmentation method combining image information with prior shape knowledge, within...
Samuel Dambreville, Yogesh Rathi, Allen Tannenbaum