scispace - formally typeset
Search or ask a question
Topic

Bounding overwatch

About: Bounding overwatch is a research topic. Over the lifetime, 966 publications have been published within this topic receiving 15156 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: Unified branch-and-bound and cutting plane algorithms for global minimization of a functionf(x, y) over a certain closed set are proposed and can be applied implementably for a certain class of nonconvex programming problems.
Abstract: We propose unified branch-and-bound and cutting plane algorithms for global minimization of a functionf(x, y) over a certain closed set By formulating the problem in terms of two groups of variables and two groups of constraints we obtain new relaxation bounding and adaptive branching operations The branching operation takes place in y-space only and uses the iteration points obtained through the bounding operation The cutting is performed in parallel with the branch-and-bound procedure The method can be applied implementably for a certain class of nonconvex programming problems

11 citations

Proceedings Article
07 Aug 2002
TL;DR: This paper introduces a method for approximating the solution to inference and optimization tasks in uncertain and deterministic reasoning, and effectively maps such a dense problem to a sparser one which is in some sense "closest".
Abstract: In this paper, we introduce a method for approximating the solution to inference and optimization tasks in uncertain and deterministic reasoning Such tasks are in general intractable for exact algorithms because of the large number of dependency relationships in their structure Our method effectively maps such a dense problem to a sparser one which is in some sense "closest" Exact methods can be run on the sparser problem to derive bounds on the original answer, which can be quite sharp On one large CPCS network, for example, we were able to calculate upper and lower bounds on the conditional probability of a variable, given evidence, that were almost identical in the average case

11 citations

Journal ArticleDOI
TL;DR: In this paper, an adversarial example attack that triggers malfunctioning of NMS in OD models is proposed, which compresses the dimensions of detection boxes to evade NMS, and the final detection output contains extremely dense false positives.
Abstract: This article demonstrates that nonmaximum suppression (NMS), which is commonly used in object detection (OD) tasks to filter redundant detection results, is no longer secure. Considering that NMS has been an integral part of OD systems, thwarting the functionality of NMS can result in unexpected or even lethal consequences for such systems. In this article, an adversarial example attack that triggers malfunctioning of NMS in OD models is proposed. The attack, namely, Daedalus, compresses the dimensions of detection boxes to evade NMS. As a result, the final detection output contains extremely dense false positives. This can be fatal for many OD applications, such as autonomous vehicles and surveillance systems. The attack can be generalized to different OD models, such that the attack cripples various OD applications. Furthermore, a way of crafting robust adversarial examples is developed by using an ensemble of popular detection models as the substitutes. Considering the pervasive nature of model reuse in real-world OD scenarios, Daedalus examples crafted based on an ensemble of substitutes can launch attacks without knowing the parameters of the victim models. The experimental results demonstrate that the attack effectively stops NMS from filtering redundant bounding boxes. As the evaluation results suggest, Daedalus increases the false positive rate in detection results to 99.9% and reduces the mean average precision scores to 0, while maintaining a low cost of distortion on the original inputs. It also demonstrates that the attack can be practically launched against real-world OD systems via printed posters.

11 citations

Proceedings ArticleDOI
06 Nov 2014
TL;DR: An approach that can be used by mission designers to determine whether or not a performance guarantee for their mission software, when carried out under the uncertain conditions of a real-world environment, will hold within a threshold probability is developed.
Abstract: We have developed an approach that can be used by mission designers to determine whether or not a performance guarantee for their mission software, when carried out under the uncertain conditions of a real-world environment, will hold within a threshold probability. In this paper we demonstrate its utility for verifying multirobot missions, in particular a bounding overwatch mission.

11 citations

Patent
17 Jan 2006
TL;DR: In this article, a seed point is selected inside a structure that is to be segmented in image data, and an adaptive model is defined around the seed point, and a preprocessing filter is applied only within the bounding region.
Abstract: A seed point is selected inside a structure that is to be segmented in image data. An adaptive model is defined around the seed point, and a preprocessing filter is applied only within the bounding region. A presegmentation of the preprocessed result is performed, and the bounding region is expanded if necessary to accommodate the presegmentation result. An adaptive model for post-processing may be used. The model is translated, rotated and scaled to find a best fit with the pre-segmented data.

11 citations


Network Information
Related Topics (5)
Robustness (computer science)
94.7K papers, 1.6M citations
85% related
Optimization problem
96.4K papers, 2.1M citations
85% related
Matrix (mathematics)
105.5K papers, 1.9M citations
82% related
Nonlinear system
208.1K papers, 4M citations
81% related
Artificial neural network
207K papers, 4.5M citations
80% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023714
20221,629
2021155
202075
201973
201850