Search
Now showing items 581-590 of 648
Attentive processing improves object recognition
(2009-10-02)
The human visual system can recognize several thousand object categories irrespective of their position and size. This combination of selectivity and invariance is built up gradually across several stages of visual processing. ...
Notes on the Shannon Entropy of the Neural Response
(2009-10-09)
In these notes we focus on the concept of Shannon entropy in an attempt to provide a systematic way of assessing the discrimination properties of the neural response, and quantifying the role played by the number of layers ...
Finding aircraft collision-avoidance strategies using policy search methods
(2009-09-12)
A progress report describing the application of policy gradient and policy search by dynamic programming methods to an aircraft collision avoidance problem inspired by the requirements of next-generation TCAS.
A Multi-Scale Generalization of the HoG and HMAX Image Descriptors for Object Detection
(2008-04-09)
Recently, several powerful image features have been proposed whichcan be described as spatial histograms of oriented energy. Forinstance, the HoG, HMAX C1, SIFT, and Shape Context feature allrepresent an input image using ...
Trajectory Analysis and Semantic Region Modeling Using A Nonparametric Bayesian Model
(2008-06-24)
We propose a novel nonparametric Bayesian model, Dual Hierarchical Dirichlet Processes (Dual-HDP), for trajectory analysis and semantic region modeling in surveillance settings, in an unsupervised way. In our approach, ...
ZigZag Decoding: Combating Hidden Terminals in Wireless Networks
(2008-04-08)
This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11 retransmissions which, in the case of hidden terminals, cause successive collisions. Due to asynchrony, these collisions ...
Two-stage Optimization Approach to Robust Model Predictive Control with a Joint Chance Constraint
(2008-03-06)
When controlling dynamic systems such as mobile robots in uncertain environments, there is a trade off between risk and reward. For example, a race car can turn a corner faster by taking a more challenging path. This paper ...
Cognitive Security for Personal Devices
(2008-03-17)
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...
LIBPMK: A Pyramid Match Toolkit
(2008-04-07)
LIBPMK is a C++ implementation of Grauman and Darrell's pyramid match algorithm. This toolkit provides a flexible framework with which developers can quickly match sets of image features and run experiments. LIBPMK provides ...
A Note on Perturbation Results for Learning Empirical Operators
(2008-08-19)
A large number of learning algorithms, for example, spectral clustering, kernel Principal Components Analysis and many manifold methods are based on estimating eigenvalues and eigenfunctions of operators defined by a ...