Sciweavers

990 search results - page 76 / 198
» Using evolution strategies to solve DEC-POMDP problems
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
ICMCS
2005
IEEE
111views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Optimized wireless video transmission using classification
— Cross protocol layer optimizations have been recently proposed for improving the performance of realtime video transmission over 802.11 WLANs. However, performing such cross-la...
Raymond S. Wong, Mihaela van der Schaar, Deepak S....
ECCV
2010
Springer
14 years 1 months ago
Modeling and Analysis of Dynamic Behaviors of Web Image Collections
Abstract. Can we model the temporal evolution of topics in Web image collections? If so, can we exploit the understanding of dynamics to solve novel visual problems or improve reco...
GECCO
2008
Springer
112views Optimization» more  GECCO 2008»
13 years 9 months ago
Parameter-less evolutionary search
The paper presents the parameter-less implementation of an evolutionary-based search. It does not need any predefined control parameters values, which are usually used for geneti...
Gregor Papa
GECCO
2006
Springer
180views Optimization» more  GECCO 2006»
13 years 11 months ago
Growth of self-canceling code in evolutionary systems
This research examines the behavior of inoperative code (introns) in the evolution of genetically robust solutions. Genetically robust solutions are solutions that are less likely...
Xue Zhong, Terence Soule