Sciweavers

13987 search results - page 94 / 2798
» The Two Guards Problem
Sort
View
PAMI
2010
207views more  PAMI 2010»
14 years 10 months ago
Document Ink Bleed-Through Removal with Two Hidden Markov Random Fields and a Single Observation Field
We present a new method for blind document bleed through removal based on separate Markov Random Field (MRF) regularization for the recto and for the verso side, where separate pri...
Christian Wolf
127
Voted
ECCV
2002
Springer
16 years 5 months ago
A Tale of Two Classifiers: SNoW vs. SVM in Visual Recognition
Numerous statistical learning methods have been developed for visual recognition tasks. Few attempts, however, have been made to address theoretical issues, and in particular, stud...
Ming-Hsuan Yang, Dan Roth, Narendra Ahuja
ICCD
2004
IEEE
103views Hardware» more  ICCD 2004»
16 years 5 days ago
A Two-Layer Bus Routing Algorithm for High-Speed Boards
The increasing clock frequencies in high-end industrial circuits bring new routing challenges that can not be handled by traditional algorithms. An important design automation pro...
Muhammet Mustafa Ozdal, Martin D. F. Wong
MICAI
2009
Springer
15 years 9 months ago
A Two-Stage Relational Reinforcement Learning with Continuous Actions for Real Service Robots
Reinforcement Learning is a commonly used technique in robotics, however, traditional algorithms are unable to handle large amounts of data coming from the robot’s sensors, requi...
Julio H. Zaragoza, Eduardo F. Morales
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 9 months ago
Two-Factor Localized Authentication Scheme for WLAN Roaming
- In the paper, we propose an efficient two-factor localized authentication scheme suitable for WLAN roaming. The proposed authentication scheme can greatly improve the security co...
Xiaodong Lin, Haojin Zhu, Pin-Han Ho, Xuemin Shen