• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 153
Next 10 →

Space-Time Completion of Video

by Yonatan Wexler, Eli Shechtman, Michal Irani , 2007
"... This paper presents a new framework for the completion of missing information based on local structures. It poses the task of completion as a global optimization problem with a well-defined objective function and derives a new algorithm to optimize it. Missing values are constrained to form coherent ..."
Abstract - Cited by 109 (4 self) - Add to MetaCart
, but not limited to: 1) Sophisticated video removal (of undesired static or dynamic objects) by completing the appropriate static or dynamic background information. 2) Correction of missing/corrupted video frames in old movies. 3) Modifying a visual story by replacing unwanted elements. 4) Creation of video

Synthesizing transformations for locality enhancement of imperfectly-nested loop nests

by Nawaaz Ahmed, Nikolay Mateev, Keshav Pingali - In Proceedings of the 2000 ACM International Conference on Supercomputing , 2000
"... We present an approach for synthesizing transformations to enhance locality in imperfectly-nested loops. The key idea is to embed the iteration space of every statement in a loop nest into a special iteration space called the product space. The product space can be viewed as a perfectly-nested loop ..."
Abstract - Cited by 64 (3 self) - Add to MetaCart
AND PREVIOUSWORK Sophisticated algorithms based on polyhedral algebra have been developed for determining good sequences of linear loop transformations (permutation, skewing, reversal and scaling) for enhancing locality in perfectly-nested loops 1. Highlights of this technology are the following. The iterations

REGRESSION FRAMEWORK FOR BACKGROUND ESTIMATION IN REMOTE SENSING IMAGERY

by James Theiler, Brendt Wohlberg
"... A key component in any target or anomaly detection algorithm is the characterization of the background. We investigate several approaches for estimating the background level at a given pixel, based on both the local neighborhood around that pixel and on the global context of the full image. By frami ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
A key component in any target or anomaly detection algorithm is the characterization of the background. We investigate several approaches for estimating the background level at a given pixel, based on both the local neighborhood around that pixel and on the global context of the full image

The Semismooth Algorithm for Large Scale Complementarity Problems

by Todd S. Munson, Francisco Facchinei, Michael C. Ferris, Andreas Fischer, Christian Kanzow , 1999
"... Complementarity solvers are continually being challenged by modelers demanding improved reliability and scalability. Building upon a strong theoretical background, the semismooth algorithm has the potential to meet both of these requirements. We briefly discuss relevant theory associated with th ..."
Abstract - Cited by 21 (7 self) - Add to MetaCart
Complementarity solvers are continually being challenged by modelers demanding improved reliability and scalability. Building upon a strong theoretical background, the semismooth algorithm has the potential to meet both of these requirements. We briefly discuss relevant theory associated

Credit Card Fraud Detection with a Neural-Network,”

by Sushmito Ghosh , Douglas L Reilly - Proc. 27th Hawaii Int‟l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems, , 1994
"... Abstract Using data from a credit card issuer, a neural network based fraud detection system was trained on a large sample of labelled credit card account transactions and tested on a holdout data set that consisted of all account activity over a subsequent two-month period of time. The neural netw ..."
Abstract - Cited by 74 (0 self) - Add to MetaCart
by general economic conditions (e.g., times of high unemployment are correlated with increases in fraud losses due to lost 1060-3425/94 $3.00 0 1994 IEEE 621 and stolen cards). Fraud due to counterfeit cards has become a growing problem over the past several years, despite the more sophisticated card

Simulating realistic network worm traffic for worm warning system design and testing

by Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray - in Proceedings of the 2003 ACM workshop on Rapid Malcode , 2003
"... Reproducing the effects of large-scale worm attacks in a laboratory setup in a realistic and reproducible manner is an important issue for the development of worm detection and defense systems. In this paper, we describe a worm simulation model we are developing to accurately model the largescale sp ..."
Abstract - Cited by 58 (7 self) - Add to MetaCart
deploying and operating a full system. Our experiments indicate that the tracking algorithms currently implemented in the DIB:S/TRAFEN system could detect attacks such as Code Red v2 and Sapphire/Slammer very early, even when monitoring a quite limited portion of the address space, but more sophisticated

Background Technical Approach Velocity Obstacles Reciprocal Velocity Obstacles Neighbor Selection

by Wesley Griffin, Wedefinetherelativecollisioncone (
"... �ere is currently much ongoing research in simulating large crowds and their movements and behaviors. Recently, a novel two-level algorithm for path planning and collision avoidance for real-time navigation of agents has been published. �e algorithm uses a simple concept called Reciprocal Velocity O ..."
Abstract - Add to MetaCart
. Additionally, when performing local collision avoidance, agents only need to take into account nearby obstacles and agents. Since the original algorithm uses a naïve method of neighbor selection, we will use a more sophisticated selection algorithm that takes into account an agent’s field of view

Context-aware visual tracking

by Ming Yang, Ying Wu, Gang Hua - IEEE TRANS. ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2009
"... Enormous uncertainties in unconstrained environments lead to a fundamental dilemma that many tracking algorithms have to face in practice: Tracking has to be computationally efficient, but verifying whether or not the tracker is following the true target tends to be demanding, especially when the ba ..."
Abstract - Cited by 55 (8 self) - Add to MetaCart
the background is cluttered and/or when occlusion occurs. Due to the lack of a good solution to this problem, many existing methods tend to be either effective but computationally intensive by using sophisticated image observation models or efficient but vulnerable to false alarms. This greatly challenges long

1Congestion Control for Background Data Transfers with Minimal Delay Impact

by Costas Courcoubetis, Antonis Dimakis, Michalis Kanakakis
"... Abstract—Congestion control protocols for background data are commonly conceived and designed to behave as low priority traffic, i.e., completely yield to delay sensitive flows such as web traffic. This behavior can cause starvation and hence the accumulation of large numbers of flows, leading to fl ..."
Abstract - Add to MetaCart
-tions on the available information is obtained analytically. We give tight bounds for the negative impact of TCP-based background transfer protocols compared to the optimal policy, and identify the range of system parameters for which more sophisticated congestion control makes a noticeable difference. Based

A Challenging Example Background to Qualitative Decision Theory

by Jon Doyle , Richmond H Thomason
"... s This article provides an overview of the field of qualitative decision theory: its motivating tasks and issues, its antecedents, and its prospects. Qualitative decision theory studies qualitative approaches to problems of decision making and their sound and effective reconciliation and integratio ..."
Abstract - Add to MetaCart
with linear orderings. To obtain nontrivial recommendations of actions and useful algorithms, additional assumptions need to be made: the scales for preferences and belief need to be interrelated, and a decisionmaking policy needs to be adopted, for example, a minimax policy. For discussion of this approach
Next 10 →
Results 1 - 10 of 153
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University