Sciweavers

672 search results - page 80 / 135
» Words and forbidden factors
Sort
View
ICB
2009
Springer
119views Biometrics» more  ICB 2009»
14 years 3 months ago
Multi-Region Probabilistic Histograms for Robust and Scalable Identity Inference
We propose a scalable face matching algorithm capable of dealing with faces subject to several concurrent and uncontrolled factors, such as variations in pose, expression, illumina...
Conrad Sanderson, Brian C. Lovell
ICVS
2009
Springer
14 years 3 months ago
GPU-Accelerated Nearest Neighbor Search for 3D Registration
Abstract. Nearest Neighbor Search (NNS) is employed by many computer vision algorithms. The computational complexity is large and constitutes a challenge for real-time capability. ...
Deyuan Qiu, Stefan May, Andreas Nüchter
ISAAC
2009
Springer
114views Algorithms» more  ISAAC 2009»
14 years 3 months ago
Good Programming in Transactional Memory
Abstract. In a multicore transactional memory (TM) system, concurrent execution threads interact and interfere with each other through shared memory. The less interference a progra...
Raphael Eidenbenz, Roger Wattenhofer
IWANN
2009
Springer
14 years 3 months ago
RCGA-S/RCGA-SP Methods to Minimize the Delta Test for Regression Tasks
Frequently, the number of input variables (features) involved in a problem becomes too large to be easily handled by conventional machine-learning models. This paper introduces a c...
Fernando Mateo, Dusan Sovilj, Rafael Gadea Giron&e...
SGAI
2009
Springer
14 years 3 months ago
An Interval Type-2 Fuzzy Multiple Echelon Supply Chain Model
Planning resources for a supply chain is a major factor determining its success or failure. In this paper we build on previous work introducing an Interval Type-2 Fuzzy Logic mode...
Simon Miller, Robert John