Results 1 - 10
of
153
Space-Time Completion of Video
, 2007
"... This paper presents a new framework for the completion of missing information based on local structures. It poses the task of completion as a global optimization problem with a well-defined objective function and derives a new algorithm to optimize it. Missing values are constrained to form coherent ..."
Abstract
-
Cited by 109 (4 self)
- Add to MetaCart
, but not limited to: 1) Sophisticated video removal (of undesired static or dynamic objects) by completing the appropriate static or dynamic background information. 2) Correction of missing/corrupted video frames in old movies. 3) Modifying a visual story by replacing unwanted elements. 4) Creation of video
Synthesizing transformations for locality enhancement of imperfectly-nested loop nests
- In Proceedings of the 2000 ACM International Conference on Supercomputing
, 2000
"... We present an approach for synthesizing transformations to enhance locality in imperfectly-nested loops. The key idea is to embed the iteration space of every statement in a loop nest into a special iteration space called the product space. The product space can be viewed as a perfectly-nested loop ..."
Abstract
-
Cited by 64 (3 self)
- Add to MetaCart
AND PREVIOUSWORK Sophisticated algorithms based on polyhedral algebra have been developed for determining good sequences of linear loop transformations (permutation, skewing, reversal and scaling) for enhancing locality in perfectly-nested loops 1. Highlights of this technology are the following. The iterations
REGRESSION FRAMEWORK FOR BACKGROUND ESTIMATION IN REMOTE SENSING IMAGERY
"... A key component in any target or anomaly detection algorithm is the characterization of the background. We investigate several approaches for estimating the background level at a given pixel, based on both the local neighborhood around that pixel and on the global context of the full image. By frami ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
A key component in any target or anomaly detection algorithm is the characterization of the background. We investigate several approaches for estimating the background level at a given pixel, based on both the local neighborhood around that pixel and on the global context of the full image
The Semismooth Algorithm for Large Scale Complementarity Problems
, 1999
"... Complementarity solvers are continually being challenged by modelers demanding improved reliability and scalability. Building upon a strong theoretical background, the semismooth algorithm has the potential to meet both of these requirements. We briefly discuss relevant theory associated with th ..."
Abstract
-
Cited by 21 (7 self)
- Add to MetaCart
Complementarity solvers are continually being challenged by modelers demanding improved reliability and scalability. Building upon a strong theoretical background, the semismooth algorithm has the potential to meet both of these requirements. We briefly discuss relevant theory associated
Credit Card Fraud Detection with a Neural-Network,”
- Proc. 27th Hawaii Int‟l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems,
, 1994
"... Abstract Using data from a credit card issuer, a neural network based fraud detection system was trained on a large sample of labelled credit card account transactions and tested on a holdout data set that consisted of all account activity over a subsequent two-month period of time. The neural netw ..."
Abstract
-
Cited by 74 (0 self)
- Add to MetaCart
by general economic conditions (e.g., times of high unemployment are correlated with increases in fraud losses due to lost 1060-3425/94 $3.00 0 1994 IEEE 621 and stolen cards). Fraud due to counterfeit cards has become a growing problem over the past several years, despite the more sophisticated card
Simulating realistic network worm traffic for worm warning system design and testing
- in Proceedings of the 2003 ACM workshop on Rapid Malcode
, 2003
"... Reproducing the effects of large-scale worm attacks in a laboratory setup in a realistic and reproducible manner is an important issue for the development of worm detection and defense systems. In this paper, we describe a worm simulation model we are developing to accurately model the largescale sp ..."
Abstract
-
Cited by 58 (7 self)
- Add to MetaCart
deploying and operating a full system. Our experiments indicate that the tracking algorithms currently implemented in the DIB:S/TRAFEN system could detect attacks such as Code Red v2 and Sapphire/Slammer very early, even when monitoring a quite limited portion of the address space, but more sophisticated
Background Technical Approach Velocity Obstacles Reciprocal Velocity Obstacles Neighbor Selection
"... �ere is currently much ongoing research in simulating large crowds and their movements and behaviors. Recently, a novel two-level algorithm for path planning and collision avoidance for real-time navigation of agents has been published. �e algorithm uses a simple concept called Reciprocal Velocity O ..."
Abstract
- Add to MetaCart
. Additionally, when performing local collision avoidance, agents only need to take into account nearby obstacles and agents. Since the original algorithm uses a naïve method of neighbor selection, we will use a more sophisticated selection algorithm that takes into account an agent’s field of view
Context-aware visual tracking
- IEEE TRANS. ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 2009
"... Enormous uncertainties in unconstrained environments lead to a fundamental dilemma that many tracking algorithms have to face in practice: Tracking has to be computationally efficient, but verifying whether or not the tracker is following the true target tends to be demanding, especially when the ba ..."
Abstract
-
Cited by 55 (8 self)
- Add to MetaCart
the background is cluttered and/or when occlusion occurs. Due to the lack of a good solution to this problem, many existing methods tend to be either effective but computationally intensive by using sophisticated image observation models or efficient but vulnerable to false alarms. This greatly challenges long
1Congestion Control for Background Data Transfers with Minimal Delay Impact
"... Abstract—Congestion control protocols for background data are commonly conceived and designed to behave as low priority traffic, i.e., completely yield to delay sensitive flows such as web traffic. This behavior can cause starvation and hence the accumulation of large numbers of flows, leading to fl ..."
Abstract
- Add to MetaCart
-tions on the available information is obtained analytically. We give tight bounds for the negative impact of TCP-based background transfer protocols compared to the optimal policy, and identify the range of system parameters for which more sophisticated congestion control makes a noticeable difference. Based
A Challenging Example Background to Qualitative Decision Theory
"... s This article provides an overview of the field of qualitative decision theory: its motivating tasks and issues, its antecedents, and its prospects. Qualitative decision theory studies qualitative approaches to problems of decision making and their sound and effective reconciliation and integratio ..."
Abstract
- Add to MetaCart
with linear orderings. To obtain nontrivial recommendations of actions and useful algorithms, additional assumptions need to be made: the scales for preferences and belief need to be interrelated, and a decisionmaking policy needs to be adopted, for example, a minimax policy. For discussion of this approach
Results 1 - 10
of
153