We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
This paper studies two types of spatial relationships that can be learned from training examples for object recognition. The first one employs deformable relationships between obj...
Causal learning methods are often evaluated in terms of their ability to discover a true underlying directed acyclic graph (DAG) structure. However, in general the true structure ...
David Duvenaud, Daniel Eaton, Kevin P. Murphy, Mar...
The structural similarity (SSIM) index has been found to be a good indicator of perceived image quality. In this paper, we propose a rate-SSIM optimization scheme for mode selecti...
Shiqi Wang, Abdul Rehman, Zhou Wang, Siwei Ma, Wen...
An adaptive, invariant to user performance fluctuation or noisy input signal, gesture recognition scheme is presented based on Self Organizing Maps, Markov Models and Levenshtein...
George Caridakis, Kostas Karpouzis, Athanasios I. ...