Sciweavers

433 search results - page 57 / 87
» Optimal Segmentation of Random Sequences
Sort
View
117
Voted
KES
2005
Springer
15 years 8 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Xinpeng Zhang, Shuozhong Wang
GREC
2009
Springer
15 years 10 days ago
Robust and Precise Circular Arc Detection
In this paper we present a method to robustly detect circular arcs in a line drawing image. The method is fast, robust and very reliable, and is capable of assessing the quality of...
Bart Lamiroy, Yassine Guebbas
111
Voted
CEC
2007
IEEE
15 years 9 months ago
A fractal representation for real optimization
— The chaos game, in which a moving point is repeatedly averaged toward randomly selected vertices of a triangle, is one method of generating the fractal called the Sierpinski tr...
Daniel A. Ashlock, Justin Schonfeld
AAAI
2010
15 years 3 months ago
Myopic Policies for Budgeted Optimization with Constrained Experiments
Motivated by a real-world problem, we study a novel budgeted optimization problem where the goal is to optimize an unknown function f(x) given a budget. In our setting, it is not ...
Javad Azimi, Xiaoli Fern, Alan Fern, Elizabeth Bur...
CORR
2007
Springer
64views Education» more  CORR 2007»
15 years 2 months ago
Optimal Sequential Frame Synchronization
We consider the ‘one-shot frame synchronization problem’ where a decoder wants to locate a sync pattern at the output of a channel on the basis of sequential observations. We ...
Venkat Chandar, Aslan Tchamkerten, Gregory W. Worn...