Sciweavers

4815 search results - page 691 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
CVPR
2004
IEEE
16 years 6 months ago
Detecting Unusual Activity in Video
We present an unsupervised technique for detecting unusual activity in a large video set using many simple features. No complex activity models and no supervised feature selection...
Hua Zhong, Jianbo Shi, Mirkó Visontai
ICCV
2003
IEEE
16 years 6 months ago
Image Statistics and Anisotropic Diffusion
Many sensing techniques and image processing applications are characterized by noisy, or corrupted, image data. Anisotropic diffusion is a popular, and theoretically well understo...
Hanno Scharr, Michael J. Black, Horst W. Haussecke...
NGC
2000
Springer
115views Communications» more  NGC 2000»
15 years 8 months ago
Hierarchical reliable multicast
The use of proxies for local error recovery and congestion control is a scalable technique used to overcome a number of wellknown problems in Reliable Multicast (RM). The idea is ...
Athina Markopoulou, Fouad A. Tobagi
ICASSP
2008
IEEE
15 years 11 months ago
Link throughput of multi-channel opportunistic access with limited sensing
—We aim to characterize the maximum link throughput of a multi-channel opportunistic communication system. The states of these channels evolve as independent and identically dist...
Keqin Liu, Qing Zhao
NIPS
2008
15 years 6 months ago
An Homotopy Algorithm for the Lasso with Online Observations
It has been shown that the problem of 1-penalized least-square regression commonly referred to as the Lasso or Basis Pursuit DeNoising leads to solutions that are sparse and there...
Pierre Garrigues, Laurent El Ghaoui