Search

Your search keyword '"Ishwar, Prakash"' showing total 55 results

Search Constraints

Start Over You searched for: Author "Ishwar, Prakash" Remove constraint Author: "Ishwar, Prakash" Database arXiv Remove constraint Database: arXiv
55 results on '"Ishwar, Prakash"'

Search Results

1. Detecting Frames in News Headlines and Lead Images in U.S. Gun Violence Coverage

2. Complexity Evaluation of Parallel Execution of the RAPiD Deep-Learning Algorithm on Intel CPU

3. On neural and dimensional collapse in supervised and unsupervised contrastive learning with hard negative sampling

4. A principled approach to model validation in domain generalization

5. Estimating Distances Between People using a Single Overhead Fisheye Camera with Application to Social-Distancing Oversight

6. Spatio-Visual Fusion-Based Person Re-Identification for Overhead Fisheye Images

7. Trade-off between reconstruction loss and feature alignment for domain generalization

8. FRIDA: Fisheye Re-Identification Dataset with Annotations

9. Supervised Contrastive Learning with Hard Negative Samples

10. Joint covariate-alignment and concept-alignment: a framework for domain generalization

11. Conditional entropy minimization principle for learning domain invariant representation features

12. Hard Negative Sampling via Regularized Optimal Transport for Contrastive Representation Learning

13. Ergodic Limits, Relaxations, and Geometric Properties of Random Walk Node Embeddings

14. Barycentric-alignment and reconstruction loss minimization for domain generalization

15. BSUV-Net 2.0: Spatio-Temporal Data Augmentations for Video-Agnostic Supervised Background Subtraction

16. OpenFraming: We brought the ML; you bring the data. Interact with your data and discover its frames

17. RAPiD: Rotation-Aware People Detection in Overhead Fisheye Images

18. Low-Resolution Overhead Thermal Tripwire for Occupancy Estimation

19. VAE/WGAN-Based Image Representation Learning For Pose-Preserving Seamless Identity Replacement In Facial Images

20. BSUV-Net: A Fully-Convolutional Neural Network for Background Subtraction of Unseen Videos

21. A Cyclically-Trained Adversarial Network for Invariant Representation Learning

22. BUOCA: Budget-Optimized Crowd Worker Allocation

23. Collaborative Privacy for Web Applications

24. VGAN-Based Image Representation Learning for Privacy-Preserving Facial Expression Recognition

25. Privacy-Preserving Adversarial Networks

26. Privacy-Utility Tradeoffs under Constrained Data Release Mechanisms

27. Node Embedding via Word Embedding for Network Community Discovery

28. Semi-Coupled Two-Stream Fusion ConvNets for Action Recognition at Extremely Low Resolutions

29. Necessary and Sufficient Conditions and a Provably Efficient Algorithm for Separable Topic Discovery

30. Learning Mixed Membership Mallows Models from Pairwise Comparisons

31. A Topic Modeling Approach to Ranking

32. A note on the sum-rate-distortion function of some lossy source coding problems involving infinite-valued distortion functions

33. An Elementary Completeness Proof for Secure Two-Party Computation Primitives

34. Sensing-Aware Kernel SVM

35. On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games

36. Necessary and Sufficient Conditions for Novel Word Detection in Separable Topic Models

37. Secure Biometrics: Concepts, Authentication Architectures and Challenges

38. Topic Discovery through Data Dependent and Random Projections

39. An Impossibility Result for High Dimensional Supervised Learning

40. A New Geometric Approach to Latent Topic Modeling and Discovery

41. Information-Theoretically Secure Three-Party Computation with One Corrupted Party

42. A Theoretical Analysis of Authentication, Privacy and Reusability Across Secure Biometric Systems

43. Unconditionally Secure Computation on Large Distributed Databases with Vanishing Cost

44. Interaction Strictly Improves the Wyner-Ziv Rate-distortion function

45. Infinite-message Interactive Function Computation in Collocated Networks

46. The Infinite-message Limit of Two-terminal Interactive Source Coding

47. Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation

48. Information-Theoretic Bounds for Multiround Function Computation in Collocated Networks

49. Distributed Source Coding for Interactive Function Computation

50. Benefit of Delay on the Diversity-Multiplexing Tradeoffs of MIMO Channels with Partial CSI

Catalog

Books, media, physical & digital resources