Sciweavers

165 search results - page 23 / 33
» Soft computing in intrusion detection: the state of the art
Sort
View
CVPR
2007
IEEE
16 years 1 months ago
Recognizing objects by piecing together the Segmentation Puzzle
We present an algorithm that recognizes objects of a given category using a small number of hand segmented images as references. Our method first over segments an input image into...
Jianbo Shi, Timothée Cour
ISCI
2008
104views more  ISCI 2008»
14 years 11 months ago
Unconditionally secure cryptosystems based on quantum cryptography
Most modern cryptographic studies design cryptosystems and algorithms using mathematical concepts. In designing and analyzing cryptosystems and protocols, mathematical concepts ar...
Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen
ICPR
2008
IEEE
16 years 26 days ago
Wavelet-based salient points with scale information for classification
The calculation of local features at points of interest is a vital part of many current image retrieval and object detection systems. The wavelet-based interest point detector by ...
Alexandra Teynor, Hans Burkhardt
ICPR
2008
IEEE
15 years 6 months ago
A device enhancing and denoising algorithm for X-ray cardiac fluoroscopy
In X-ray interventional imaging, improved denoising enables lower X-ray dose and better visualization, resulting in increased confidence in the therapeutic act. This article focu...
Vincent Bismuth, Régis Vaillant
109
Voted
PPSN
2004
Springer
15 years 5 months ago
LS-CMA-ES: A Second-Order Algorithm for Covariance Matrix Adaptation
Abstract. Evolution Strategies, Evolutionary Algorithms based on Gaussian mutation and deterministic selection, are today considered the best choice as far as parameter optimizatio...
Anne Auger, Marc Schoenauer, Nicolas Vanhaecke