Sciweavers

977 search results - page 46 / 196
» Soft Constraints for Security
Sort
View
SIAMSC
2008
165views more  SIAMSC 2008»
14 years 9 months ago
Iterated Hard Shrinkage for Minimization Problems with Sparsity Constraints
Abstract. A new iterative algorithm for the solution of minimization problems in infinitedimensional Hilbert spaces which involve sparsity constraints in form of p-penalties is pro...
Kristian Bredies, Dirk A. Lorenz
CVPR
2011
IEEE
14 years 6 months ago
Enforcing Similarity Constraints with Integer Programming for Better Scene Text Recognition
The recognition of text in everyday scenes is made difficult by viewing conditions, unusual fonts, and lack of linguistic context. Most methods integrate a priori appearance info...
David Smith, Jacqueline Feild, Eric Learned-Miller
CG
2006
Springer
14 years 10 months ago
Interactive mesh deformation using equality-constrained least squares
Mesh deformation techniques that preserve the differential properties have been intensively studied. In this paper, we propose an equality-constrained least squares approach for s...
H. Masuda, Y. Yoshioka, Y. Furukawa
AAAI
1998
14 years 11 months ago
A* with Bounded Costs
A key assumption of all problem-solving approaches based on utility theory, including heuristic search, is that we can assign a utility or cost to each state. This in turn require...
Brian Logan, Natasha Alechina
NAACL
2010
14 years 7 months ago
Learning Translation Boundaries for Phrase-Based Decoding
Constrained decoding is of great importance not only for speed but also for translation quality. Previous efforts explore soft syntactic constraints which are based on constituent...
Deyi Xiong, Min Zhang, Haizhou Li