Sciweavers

10907 search results - page 31 / 2182
» Constraint Based Strategies
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 4 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
DSN
2003
IEEE
14 years 3 months ago
An Algorithm for Automatically Obtaining Distributed and Fault-Tolerant Static Schedules
Our goal is to automatically obtain a distributed and fault-tolerant embedded system: distributed because the system must run on a distributed architecture; fault-tolerant because...
Alain Girault, Hamoudi Kalla, Mihaela Sighireanu, ...
ILP
2005
Springer
14 years 3 months ago
Guiding Inference Through Relational Reinforcement Learning
Abstract. Reasoning plays a central role in intelligent systems that operate in complex situations that involve time constraints. In this paper, we present the Adaptive Logic Inter...
Nima Asgharbeygi, Negin Nejati, Pat Langley, Sachi...
ICDE
1998
IEEE
99views Database» more  ICDE 1998»
14 years 2 months ago
Query Folding with Inclusion Dependencies
Query folding is a technique for determining how a query may be answered using a given set of resources, which may include materialized views, cached results of previous queries, ...
Jarek Gryz
CVPR
2004
IEEE
14 years 11 months ago
Region-Based Progressive Stereo Matching
A novel region-based progressive stereo matching algorithm is presented. It combines the strengthes of previous region-based and progressive approaches. The progressive framework ...
Yichen Wei, Long Quan