Sciweavers

1616 search results - page 222 / 324
» Robust game theory
Sort
View
ENTCS
2006
161views more  ENTCS 2006»
13 years 9 months ago
Tool Building Requirements for an API to First-Order Solvers
Effective formal verification tools require that robust implementations of automatic procedures for first-order logic and satisfiability modulo theories be integrated into express...
Jim Grundy, Thomas F. Melham, Sava Krstic, Sean Mc...
IJON
2006
111views more  IJON 2006»
13 years 9 months ago
Dynamic pruning algorithm for multilayer perceptron based neural control systems
Generalization ability of neural networks is very important and a rule of thumb for good generalization in neural systems is that the smallest system should be used to fit the tra...
Jie Ni, Qing Song
IJNSEC
2007
96views more  IJNSEC 2007»
13 years 8 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
TSMC
2002
119views more  TSMC 2002»
13 years 8 months ago
Approximation of n-dimensional data using spherical and ellipsoidal primitives
This paper discusses the problem of approximating data points in -dimensional Euclidean space using spherical and ellipsoidal surfaces. A closed form solution is provided for spher...
Giuseppe Carlo Calafiore
ICCV
2011
IEEE
12 years 9 months ago
Dense Disparity Maps from Sparse Disparity Measurements
In this work we propose a method for estimating disparity maps from very few measurements. Based on the theory of Compressive Sensing, our algorithm accurately reconstructs dispar...
Simon Hawe, Martin Kleinsteuber, Klaus Diepold