Sciweavers

1585 search results - page 219 / 317
» Automatically optimizing secure computation
Sort
View
AVSS
2006
IEEE
14 years 2 months ago
An LMI Approach for Reliable PTZ Camera Self-Calibration
PTZ (Pan-Tilt-Zoom) cameras are widely used for large-area video surveillance. For many visual tracking and video analysis tasks, an accurate camera calibration is very important....
Hongdong Li, Chunhua Shen
ROBIO
2006
IEEE
123views Robotics» more  ROBIO 2006»
14 years 2 months ago
Evolutionary Robotics, Anticipation and the Reality Gap
— Evolutionary Robotics provide efficient tools and approach to address automatic design of controllers for automous mobile robots. However, the computational cost of the optimi...
Cédric Hartland, Nicolas Bredeche
TEX
2004
Springer
283views Latex» more  TEX 2004»
14 years 1 months ago
Creating Type 1 Fonts from METAFONT Sources
This paper summarizes experiences in converting METAFONT fonts to PostScript fonts with TEXtrace and mftrace, based on programs of autotracing bitmaps (AutoTrace and potrace), and...
Karel Píska
GECCO
2003
Springer
100views Optimization» more  GECCO 2003»
14 years 1 months ago
Dense and Switched Modular Primitives for Bond Graph Model Design
This paper suggests dense and switched modular primitives for a bond-graph-based GP design framework that automatically synthesizes designs for multi-domain, lumped parameter dynam...
Kisung Seo, Zhun Fan, Jianjun Hu, Erik D. Goodman,...
CPAIOR
2010
Springer
14 years 1 months ago
Upper Bounds on the Number of Solutions of Binary Integer Programs
We present a new method to compute upper bounds of the number of solutions of binary integer programming (BIP) problems. Given a BIP, we create a dynamic programming (DP) table for...
Siddhartha Jain, Serdar Kadioglu, Meinolf Sellmann