Sciweavers

2131 search results - page 24 / 427
» Immunity for Closed Sets
Sort
View
CVPR
2008
IEEE
15 years 28 days ago
Closing the loop in scene interpretation
Image understanding involves analyzing many different aspects of the scene. In this paper, we are concerned with how these tasks can be combined in a way that improves the perform...
Derek Hoiem, Alexei A. Efros, Martial Hebert
VTS
2005
IEEE
116views Hardware» more  VTS 2005»
14 years 4 months ago
Closed-Form Simulation and Robustness Models for SEU-Tolerant Design
— A closed-form model for simulation and analysis of voltage transients caused by single-event upsets (SEUs) in logic circuits is described. A linear RC model, derived using a SP...
Kartik Mohanram
TKDE
2008
94views more  TKDE 2008»
13 years 10 months ago
DryadeParent, An Efficient and Robust Closed Attribute Tree Mining Algorithm
In this paper, we present a new tree mining algorithm, DRYADEPARENT, based on the hooking principle first introduced in DRYADE. In the experiments, we demonstrate that the branchin...
Alexandre Termier, Marie-Christine Rousset, Mich&e...
CVPR
2004
IEEE
15 years 28 days ago
From Fragments to Salient Closed Boundaries: An In-Depth Study
This paper conducts an in-depth study on a classical perceptual-organization problem: finding salient closed boundaries from a set of boundary fragments detected in a noisy image....
Song Wang, Jun Wang, Toshiro Kubota
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 11 months ago
Efficient closed pattern mining in the presence of tough block constraints
In recent years, various constrained frequent pattern mining problem formulations and associated algorithms have been developed that enable the user to specify various itemsetbase...
Krishna Gade, Jianyong Wang, George Karypis