Search
Now showing items 101-110 of 149
The computational magic of the ventral stream: sketch of a theory (and why some deep architectures work).
(2012-12-29)
This paper explores the theoretical consequences of a simple assumption: the computational goal of the feedforward path in the ventral stream -- from V1, V2, V4 and to IT -- is to discount image transformations, after ...
Designing Umeli: A Case for Medsersiated Design, a participatory approach to designing interactive systems for semi-literate users
(2012-10)
This dissertation documents a journey into the design of Ummeli with a community of semi-‐literate job seekers in Khayelitsha, Cape Town whose primary access to the internet was through their mobile phones. Working closely ...
A Heuristic Image Search Algorithm for Active Shape Model Segmentation of the Caudate Nucleus and Hippocampus in Brain MR Images of Children with FASD
(South African Institute of Computer Scientists and Information Technologists, 2012)
Magnetic Resonance Imaging provides a non-invasive means to study the neural correlates of Fetal Alcohol Spectrum Disorder (FASD) - the most common form of preventable mental retardation worldwide. One approach aims to ...
A Gaussian Approximation of Feature Space for Fast Image Similarity
(2012-10-01)
We introduce a fast technique for the robust computation of image similarity. It builds on a re-interpretation of the recent exemplar-based SVM approach, where a linear SVM is trained at a query point and distance is ...
The Order Independence of Iterated Dominance in Extensive Games, with Connections to Mechanism Design and Backward Induction
(2012-07-31)
Shimoji and Watson (1998) prove that a strategy of an extensive game is rationalizable in the sense of Pearce if and only if it survives the maximal elimination of conditionally dominated strategies. Briefly, this process ...
Multiscale Geometric Methods for Data Sets I: Multiscale SVD, Noise and Curvature
(2012-09-08)
Large data sets are often modeled as being noisy samples from probability distributions in R^D, with D large. It has been noticed that oftentimes the support M of these probability distributions seems to be well-approximated ...
Using Program Synthesis for Social Recommendations
(2012-08-13)
This paper presents a new approach to select events of interest to a user in a social media setting where events are generated by the activities of the user's friends through their mobile devices. We argue that given the ...
Bounded-Contention Coding for Wireless Networks in the High SNR Regime
(2012-08-27)
Efficient communication in wireless networks is typically challenged by the possibility of interference among several transmitting nodes. Much important research has been invested in decreasing the number of collisions in ...
From Formal Methods to Executable Code
(2012-08-27)
The objective of this work is the derivation of software that is verifiably correct. Our approach is to abstract system specifications and model these in a formal framework called Timed Input/Output Automata, which provides ...