Sciweavers

1344 search results - page 212 / 269
» Quantization
Sort
View
71
Voted
DCC
2002
IEEE
16 years 10 days ago
Source Requantization: Successive Degradation and Bit Stealing
We consider source requantization in two forms -- successive degradation (i.e., source fidelity reduction) and bit stealing (i.e., information embedding) -when no forward planning...
Aaron S. Cohen, Stark C. Draper, Emin Martinian, G...
132
Voted
CVPR
2010
IEEE
15 years 10 months ago
Online Visual Vocabulary Pruning Using Pairwise Constraints
Given a pair of images represented using bag-of-visual words and a label corresponding to whether the images are “related”(must-link constraint) or “unrelated” (must not li...
Pavan Mallapragada, Rong Jin and Anil Jain
ICCAD
2006
IEEE
146views Hardware» more  ICCAD 2006»
15 years 9 months ago
An analytical model for negative bias temperature instability
— Negative Bias Temperature Instability (NBTI) in PMOS transistors has become a significant reliability concern in present day digital circuit design. With continued scaling, th...
Sanjay V. Kumar, Chris H. Kim, Sachin S. Sapatneka...
CVPR
2010
IEEE
15 years 9 months ago
Learning Mid-Level Features For Recognition
Many successful models for scene or object recognition transform low-level descriptors (such as Gabor filter responses, or SIFT descriptors) into richer representations of interme...
Y-Lan Boureau, Francis Bach, Yann LeCun, Jean Ponc...
123
Voted
CVPR
2010
IEEE
15 years 9 months ago
Learning a Hierarchy of Discriminative Space-Time Neighborhood Features for Human Action Recognition
Recent work shows how to use local spatio-temporal features to learn models of realistic human actions from video. However, existing methods typically rely on a predefined spatial...
Adriana Kovashka, Kristen Grauman