Sciweavers

11371 search results - page 21 / 2275
» The network inhibition problem
Sort
View
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption
Content-dependent watermarking (CDWM) has been proposed as a solution to overcome the potential estimation attack aiming to recover and remove the watermark from the host signal. ...
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun
ACII
2007
Springer
14 years 3 months ago
Model of Facial Expressions Management for an Embodied Conversational Agent
Abstract. In this paper we present a model of facial behaviour encompassing interpersonal relations for an Embodied Conversational Agent (ECA). Although previous solutions of this ...
Radoslaw Niewiadomski, Catherine Pelachaud
WSC
2007
13 years 11 months ago
Transformations for accelerating MCMC simulations with broken ergodicity
A new approach for overcoming broken ergodicity in Markov Chain Monte Carlo (MCMC) simulations of complex systems is described. The problem of broken ergodicity is often present i...
Mark Fleischer
ESANN
2008
13 years 10 months ago
A neural model with feedback for robust disambiguation of motion
Abstract. The aperture problem is a direct consequence of any local detection in the visual perception of motion. It results in ambiguous responses of the local motion detectors. B...
Mauricio Cerda, Bernard Girau
PAMI
2007
99views more  PAMI 2007»
13 years 8 months ago
Regularized Image Recovery in Scattering Media
—When imaging in scattering media, visibility degrades as objects become more distant. Visibility can be significantly restored by computer vision methods that account for physic...
Yoav Y. Schechner, Yuval Averbuch