Sciweavers

2250 search results - page 109 / 450
» Authorizing applications in singularity
Sort
View
CIKM
2010
Springer
14 years 8 months ago
Yes we can: simplex volume maximization for descriptive web-scale matrix factorization
Matrix factorization methods are among the most common techniques for detecting latent components in data. Popular examples include the Singular Value Decomposition or Nonnegative...
Christian Thurau, Kristian Kersting, Christian Bau...
CORR
2010
Springer
162views Education» more  CORR 2010»
14 years 8 months ago
Networked Computing in Wireless Sensor Networks for Structural Health Monitoring
Abstract—This paper studies the problem of distributed computation over a network of wireless sensors. While this problem applies to many emerging applications, to keep our discu...
Apoorva Jindal, Mingyan Liu
ICASSP
2010
IEEE
14 years 8 months ago
Optimization of a maximum entropy criterion for 2D Nuclear Magnetic Resonance reconstruction
This paper deals with the reconstruction of T1-T2 correlation spectra in Nuclear Magnetic Resonance (NMR) spectroscopy. The ill-posed character of this inverse problem and its lar...
Emilie Chouzenoux, Saïd Moussaoui, Jér...
ICIP
2010
IEEE
14 years 8 months ago
A sparsity-distortion-optimized multiscale representation of geometry
This paper describes the construction of a new multiresolutional decomposition with applications to image compression. The proposed method designs sparsity-distortion-optimized or...
Osman Gokhan Sezer, Yucel Altunbasak, Onur G. Gule...
ICIP
2010
IEEE
14 years 8 months ago
Real-time interactive multi-target tracking using kernel-based trackers
Although kernel-based methods have been demonstrated effectively in solving single-target tracking problem, facing more complicated multi-target tracking task, most of them still ...
Guorong Li, Wei Qu, Qingming Huang