Sciweavers

1036 search results - page 164 / 208
» Utilizing Validation Experience for System Validation
Sort
View
IFSA
2003
Springer
89views Fuzzy Logic» more  IFSA 2003»
14 years 27 days ago
Lattice Fuzzy Signal Operators and Generalized Image Gradients
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that are nonlinear convolutions...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...
MOBILITY
2009
ACM
14 years 11 days ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
RT
1998
Springer
13 years 12 months ago
Fidelity of Graphics Reconstructions: A Psychophysical Investigation
In this paper we develop a technique for measuring the perceptual equivalence of a graphical scene to a real scene. Ability to compare images is valuable in computer graphics for a...
Ann McNamara, Alan Chalmers, Tom Troscianko, Erik ...
CVPR
2007
IEEE
13 years 11 months ago
Local Shape Registration Using Boundary-Constrained Match of Skeletons
This paper presents a new shape registration algorithm that establishes "meaningful correspondence" between objects, in that it preserves the local shape correspondence ...
Yun Zhu, Xenophon Papademetris, Albert J. Sinusas,...
KDD
2010
ACM
282views Data Mining» more  KDD 2010»
13 years 11 months ago
Optimizing debt collections using constrained reinforcement learning
In this paper, we propose and develop a novel approach to the problem of optimally managing the tax, and more generally debt, collections processes at financial institutions. Our...
Naoki Abe, Prem Melville, Cezar Pendus, Chandan K....