Sciweavers

15351 search results - page 382 / 3071
» The information bottleneck method
Sort
View
ICIAR
2009
Springer
15 years 10 months ago
An Example-Based Two-Step Face Hallucination Method through Coefficient Learning
Face hallucination is to reconstruct a high-resolution face image from a low-resolution one based on a set of high- and low-resolution training image pairs. This paper proposes an ...
Xiang Ma, Junping Zhang, Chun Qi
118
Voted
ICIW
2008
IEEE
15 years 10 months ago
NAT Traversal Method for Multi-Agent-Based Meeting Scheduling System
—We previously proposed a meeting scheduling system based on mobile agent technology. The users of our system do not need to input all of their schedules unlike the existing grou...
Yusuke Hamada, Shinichi Motomura, Takao Kawamura, ...
142
Voted
IEEEARES
2008
IEEE
15 years 10 months ago
A Post-processing Method to Lessen k-Anonymity Dissimilarities
Protecting personal data is essential to guarantee the rule of law1 . Due to the new Information and Communication Technologies (ICTs) unprecedented amounts of personal data can b...
Agusti Solanas, Gloria Pujol, Antoni Martín...
154
Voted
GECCO
2007
Springer
190views Optimization» more  GECCO 2007»
15 years 9 months ago
Interactive evolutionary multi-objective optimization and decision-making using reference direction method
In this paper, we borrow the concept of reference direction approach from the multi-criterion decision-making literature and combine it with an EMO procedure to develop an algorit...
Kalyanmoy Deb, Abhishek Kumar
130
Voted
MSWIM
2006
ACM
15 years 9 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt