Sciweavers

1344 search results - page 212 / 269
» Quantization
Sort
View
DCC
2002
IEEE
14 years 9 months ago
Source Requantization: Successive Degradation and Bit Stealing
We consider source requantization in two forms -- successive degradation (i.e., source fidelity reduction) and bit stealing (i.e., information embedding) -when no forward planning...
Aaron S. Cohen, Stark C. Draper, Emin Martinian, G...
CVPR
2010
IEEE
14 years 7 months ago
Online Visual Vocabulary Pruning Using Pairwise Constraints
Given a pair of images represented using bag-of-visual words and a label corresponding to whether the images are “related”(must-link constraint) or “unrelated” (must not li...
Pavan Mallapragada, Rong Jin and Anil Jain
ICCAD
2006
IEEE
146views Hardware» more  ICCAD 2006»
14 years 6 months ago
An analytical model for negative bias temperature instability
— Negative Bias Temperature Instability (NBTI) in PMOS transistors has become a significant reliability concern in present day digital circuit design. With continued scaling, th...
Sanjay V. Kumar, Chris H. Kim, Sachin S. Sapatneka...
CVPR
2010
IEEE
14 years 6 months ago
Learning Mid-Level Features For Recognition
Many successful models for scene or object recognition transform low-level descriptors (such as Gabor filter responses, or SIFT descriptors) into richer representations of interme...
Y-Lan Boureau, Francis Bach, Yann LeCun, Jean Ponc...
CVPR
2010
IEEE
14 years 6 months ago
Learning a Hierarchy of Discriminative Space-Time Neighborhood Features for Human Action Recognition
Recent work shows how to use local spatio-temporal features to learn models of realistic human actions from video. However, existing methods typically rely on a predefined spatial...
Adriana Kovashka, Kristen Grauman