Sciweavers

2941 search results - page 510 / 589
» Communication Performance Issues for Two Cluster Computers
Sort
View
174
Voted
EMMCVPR
2003
Springer
15 years 10 months ago
Asymptotic Characterization of Log-Likelihood Maximization Based Algorithms and Applications
The asymptotic distribution of estimates that are based on a sub-optimal search for the maximum of the log-likelihood function is considered. In particular, estimation schemes that...
Doron Blatt, Alfred O. Hero
ICPR
2004
IEEE
16 years 6 months ago
Pruning Local Feature Correspondences Using Shape Context
We propose a novel approach to improve the distinctiveness of local image features without significantly affecting their robustness with respect to image deformations. Local image...
Allan D. Jepson, Gustavo Carneiro
WS
2003
ACM
15 years 10 months ago
Rushing attacks and defense in wireless ad hoc network routing protocols
In an ad hoc network, mobile computers (or nodes) cooperate to forward packets for each other, allowing nodes to communicate beyond their direct wireless transmission range. Many ...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
QCQC
1998
Springer
173views Communications» more  QCQC 1998»
15 years 9 months ago
Quantum Wavelet Transforms: Fast Algorithms and Complete Circuits
The quantum Fourier transform (QFT), a quantum analog of the classical Fourier transform, has been shown to be a powerful tool in developing quantum algorithms. However, in classi...
Amir Fijany, Colin P. Williams
CVPR
2008
IEEE
16 years 7 months ago
Principled fusion of high-level model and low-level cues for motion segmentation
High-level generative models provide elegant descriptions of videos and are commonly used as the inference framework in many unsupervised motion segmentation schemes. However, app...
Arasanathan Thayananthan, Masahiro Iwasaki, Robert...