Zobrazeno 1 - 10
of 6 064
pro vyhledávání: '"Hider, P."'
3D Gaussian Splatting (3DGS) has already become the emerging research focus in the fields of 3D scene reconstruction and novel view synthesis. Given that training a 3DGS requires a significant amount of time and computational cost, it is crucial to p
Externí odkaz:
http://arxiv.org/abs/2405.15118
Autor:
Sophie Baur, Ferdinand P. Stehr, A. J. Mark Hewison, Nicolas Morellet, Nathan Ranc, Andreas König, Annette Menzel, Wibke Peters
Publikováno v:
Movement Ecology, Vol 12, Iss 1, Pp 1-15 (2024)
Abstract Background Parental care is indispensable for the survival and development of dependent offspring, often requiring a delicate balance of time and energy allocation towards offspring by parents. Among ungulates employing a hider strategy, dec
Externí odkaz:
https://doaj.org/article/fcc20eead5c649b9a5c07d27161a44b2
Massive captured face images are stored in the database for the identification of individuals. However, these images can be observed unintentionally by data managers, which is not at the will of individuals and may cause privacy violations. Existing
Externí odkaz:
http://arxiv.org/abs/2307.00481
Autor:
Alpern, Steve, Lidbetter, Thomas
Adversarial search of a network for an immobile Hider (or target) was introduced and solved for rooted trees by Gal (1979). In this zero-sum game, a Hider picks a point to hide on the tree and a Searcher picks a unit speed trajectory starting at the
Externí odkaz:
http://arxiv.org/abs/2303.13378
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Deep neural networks have been widely used in many computer vision tasks. However, it is proved that they are susceptible to small, imperceptible perturbations added to the input. Inputs with elaborately designed perturbations that can fool deep lear
Externí odkaz:
http://arxiv.org/abs/2010.14974
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Ku-Sung Hsieh, Chung-Ming Wang
Publikováno v:
Applied Sciences, Vol 13, Iss 2, p 1013 (2023)
This paper proposes a multi-hider dual-image reversible data-hiding algorithm. Generating dual stego images, the proposed algorithm provides a high embedding capacity, exhibits high image quality, offers reversibility to restore the stego images, and
Externí odkaz:
https://doaj.org/article/43616a9a1f56469e850c7974d73677a1
Autor:
Garrec, Tristan, Scarsini, Marco
Publikováno v:
Eur.J.Oper.Res. 283 (2020) 783-794
Harry hides on an edge of a graph and does not move from there. Sally, starting from a known origin, tries to find him as soon as she can. Harry's goal is to be found as late as possible. At any given time, each edge of the graph is either active or
Externí odkaz:
http://arxiv.org/abs/1904.12852