• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,856
Next 10 →

Unsupervised texture segmentation using Gabor filters

by Ani K. Jain, Farshid Farrokhnia - Pattern Recognition
"... We presenf a texture segmentation algorithm inspired by the multi-channel filtering theory for visual information processing in the early stages of human visual system. The channels are characterized by a bank of Gabor filters that nearly uniformly covers the spatial-frequency domain. We propose a s ..."
Abstract - Cited by 616 (20 self) - Add to MetaCart
We presenf a texture segmentation algorithm inspired by the multi-channel filtering theory for visual information processing in the early stages of human visual system. The channels are characterized by a bank of Gabor filters that nearly uniformly covers the spatial-frequency domain. We propose a

Constrained model predictive control: Stability and optimality

by D. Q. Mayne, J. B. Rawlings, C. V. Rao, P. O. M. Scokaert - AUTOMATICA , 2000
"... Model predictive control is a form of control in which the current control action is obtained by solving, at each sampling instant, a finite horizon open-loop optimal control problem, using the current state of the plant as the initial state; the optimization yields an optimal control sequence and t ..."
Abstract - Cited by 738 (16 self) - Add to MetaCart
and/or time-varying systems. We concentrate our attention on research dealing with stability and optimality; in these areas the subject has developed, in our opinion, to a stage where it has achieved sufficient maturity to warrant the active interest of researchers in nonlinear control. We distill

Iterative (turbo) soft interference cancellation and decoding for coded CDMA

by Xiaodong Wang, H. Vincent Poor - IEEE Trans. Commun , 1999
"... Abstract — The presence of both multiple-access interference (MAI) and intersymbol interference (ISI) constitutes a major impediment to reliable communications in multipath code-division multiple-access (CDMA) channels. In this paper, an iterative receiver structure is proposed for decoding multiuse ..."
Abstract - Cited by 456 (18 self) - Add to MetaCart
iteration, extrinsic information is extracted from detection and decoding stages and is then used as a priori information in the next iteration, just as in Turbo decoding. Given the multipath CDMA channel model, a direct implementation of a sliding-window SISO multiuser detector has a prohibitive

Tabu Search -- Part II

by Fred Glover , 1990
"... This is the second half of a two part series devoted to the tabu search metastrategy for optimization problems. Part I introduced the fundamental ideas of tabu search as an approach for guiding other heuristics to overcome the limitations of local optimality, both in a deterministic and a probabilis ..."
Abstract - Cited by 387 (5 self) - Add to MetaCart
refinements and more advanced aspects of tabu search. Following a brief review of notation, Part I1 introduces new dynamic strategies for managing tabu lists, allowing fuller exploitation of underlying evaluation functions. In turn, the elements of staged search and structured move sets are characterized

Superregular solitonic solutions: A novel scenario for the nonlinear stage of modulation instability

by V. E. Zakharov, A. A. Gelash - Nonlinearity
"... Abstract. We describe a general N-solitonic solution of the focusing NLSE in the presence of a condensate by using the dressing method. We give the explicit form of one- and two- solitonic solutions and study them in detail. We distinguish a special class of solutions that we call regular solitonic ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
solitonic solutions are generated by pairs of poles located on opposite sides of the cut. They describe the nonlinear stage of the modulation instability of the condensate and play an important role in the theory of freak waves. ar X iv

The Effect of Resistivity on the Nonlinear Stage of the Magnetorotational Instability in Accretion Disks

by Timothy P. Fleming, James M. Stone, John F. Hawley , 2000
"... We present three-dimensional magnetohydrodynamic simulations of the nonlinear evolution of the magnetorotational instability (MRI) with a non-zero Ohmic resistivity. The simulations begin from a homogeneous (unstratified) density distribution, and use the local shearing-box approximation. The evolut ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
We present three-dimensional magnetohydrodynamic simulations of the nonlinear evolution of the magnetorotational instability (MRI) with a non-zero Ohmic resistivity. The simulations begin from a homogeneous (unstratified) density distribution, and use the local shearing-box approximation

What is the Best Multi-Stage Architecture for Object Recognition?

by Kevin Jarrett, Koray Kavukcuoglu, Yann Lecun
"... In many recent object recognition systems, feature extraction stages are generally composed of a filter bank, a non-linear transformation, and some sort of feature pooling layer. Most systems use only one stage of feature extraction in which the filters are hard-wired, or two stages where the filter ..."
Abstract - Cited by 252 (22 self) - Add to MetaCart
In many recent object recognition systems, feature extraction stages are generally composed of a filter bank, a non-linear transformation, and some sort of feature pooling layer. Most systems use only one stage of feature extraction in which the filters are hard-wired, or two stages where

On-line Fingerprint Verification

by Anil Jain, Lin Hong, Ruud Bolle - IEEE Transactions on Pattern Analysis and Machine Intelligence , 1997
"... Abstract—Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and expensive that it is incapable of meeting today’s increasing performance requirements. An automatic fingerprint identification sy ..."
Abstract - Cited by 300 (32 self) - Add to MetaCart
system (AFIS) is widely needed. It plays a very important role in forensic and civilian applications such as criminal identification, access control, and ATM card verification. This paper describes the design and implementation of an on-line fingerprint verification system which operates in two stages

Nonlinear source separation: the post-nonlinear mixtures

by Anisse Taleb, Christian Jutten - In: Proceedings of the ESANN’97 , 1997
"... Abstract—In this paper, we address the problem of separation of mutually independent sources in nonlinear mixtures. First, we propose theoretical results and prove that in the general case, it is not possible to separate the sources without nonlinear distortion. Therefore, we focus our work on speci ..."
Abstract - Cited by 148 (26 self) - Add to MetaCart
.e., in such nonlinear mixtures, sources can be estimated with the same indeterminacies as in instantaneous linear mixtures. The separation structure of nonlinear mixtures is a two-stage system, namely, a nonlinear stage followed by a linear stage, the parameters of which are updated to minimize an output independence

Multiple Kernels for Object Detection

by Andrea Vedaldi, Varun Gulshan, Manik Varma, Andrew Zisserman
"... Our objective is to obtain a state-of-the art object category detector by employing a state-of-the-art image classifier to search for the object in all possible image subwindows. We use multiple kernel learning of Varma and Ray (ICCV 2007) to learn an optimal combination of exponential χ 2 kernels, ..."
Abstract - Cited by 275 (10 self) - Add to MetaCart
. Thus we propose a novel three-stage classifier, which combines linear, quasi-linear, and non-linear kernel SVMs. We show that increasing the non-linearity of the kernels increases their discriminative power, at the cost of an increased computational complexity. Our contributions include (i) showing
Next 10 →
Results 1 - 10 of 2,856
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University