Sciweavers

203 search results - page 26 / 41
» Second-Order Risk Constraints
Sort
View
CVPR
2005
IEEE
14 years 9 months ago
Tracking Non-Stationary Appearances and Dynamic Feature Selection
Since the appearance changes of the target jeopardize visual measurements and often lead to tracking failure in practice, trackers need to be adaptive to non-stationary appearance...
Ming Yang, Ying Wu
PAMI
2012
11 years 9 months ago
Learning Optimal Embedded Cascades
—The problem of automatic and optimal design of embedded object detector cascades is considered. Two main challenges are identified: optimization of the cascade configuration and...
Mohammad Javad Saberian, Nuno Vasconcelos
CP
2008
Springer
13 years 9 months ago
Model Restarts for Structural Symmetry Breaking
ctural abstractions that were introduced in [17]. Compared with other symmetry-breaking techniques, the big advantage of dynamic symmetry breaking is that it can accommodate dynami...
Daniel S. Heller, Aurojit Panda, Meinolf Sellmann,...
ICIP
2005
IEEE
14 years 9 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
ICRA
2008
IEEE
145views Robotics» more  ICRA 2008»
14 years 1 months ago
Injury evaluation of human-robot impacts
— Currently, large efforts are unertaken to bring robotic applications to domestic environments. Especially physical human-robot cooperation is a major concern and various design...
Sami Haddadin, Alin Albu-Schäffer, Michael St...