Sciweavers

137 search results - page 7 / 28
» Closed-loop Robust Identification Using the Indirect Approac...
Sort
View
ICASSP
2008
IEEE
14 years 1 months ago
Mutual features for robust identification and verification
Noisy or distorted video/audio training sets represent constant challenges in automated identification and verification tasks. We propose the method of Mutual Interdependence An...
Heiko Claussen, Justinian Rosca, Robert I. Damper
ISCA
1997
IEEE
137views Hardware» more  ISCA 1997»
13 years 11 months ago
A Language for Describing Predictors and Its Application to Automatic Synthesis
As processor architectures have increased their reliance on speculative execution to improve performance, the importance of accurate prediction of what to execute speculatively ha...
Joel S. Emer, Nicholas C. Gloy
RAS
2008
139views more  RAS 2008»
13 years 7 months ago
Unsupervised identification of useful visual landmarks using multiple segmentations and top-down feedback
In this paper, we tackle the problem of unsupervised selection and posterior recognition of visual landmarks in images sequences acquired by an indoor mobile robot. This is a high...
Pablo Espinace, Daniel Langdon, Alvaro Soto
JCP
2008
190views more  JCP 2008»
13 years 7 months ago
Real-time System Identification of Unmanned Aerial Vehicles: A Multi-Network Approach
In this paper, real-time system identification of an unmanned aerial vehicle (UAV) based on multiple neural networks is presented. The UAV is a multi-input multi-output (MIMO) nonl...
Vishwas R. Puttige, Sreenatha G. Anavatti
CEAS
2007
Springer
14 years 1 months ago
A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification
We propose a discriminative classifier learning approach to image modeling for spam image identification. We analyze a large number of images extracted from the SpamArchive spam c...
Byungki Byun, Chin-Hui Lee, Steve Webb, Calton Pu