Sciweavers

15033 search results - page 304 / 3007
» Complexity Theory and Algorithms
Sort
View
172
Voted
ICCV
2011
IEEE
14 years 5 months ago
A Theory of Coprime Blurred Pairs
We present a new Coprime Blurred Pair (CBP) theory that may benefit a number of computer vision applications. A CBP is constructed by blurring the same latent image with two unkn...
Feng Li, Zijia Li, David Saunders, Jingyi Yu
154
Voted
FORTE
1997
15 years 6 months ago
Refusal Testing for Classes of Transition Systems with Inputs and Outputs
This paper presents a testing theory that is parameterised with assumptions about the way implementations communicate with their environment. In this way some existing testing the...
Lex Heerink, Jan Tretmans
ICASSP
2011
IEEE
14 years 8 months ago
Rank-deficient quadratic-form maximization over M-phase alphabet: Polynomial-complexity solvability and algorithmic developments
The maximization of a positive (semi)definite complex quadratic form over a finite alphabet is NP-hard and achieved through exhaustive search when the form has full rank. Howeve...
Anastasios T. Kyrillidis, George N. Karystinos
ICPR
2002
IEEE
16 years 6 months ago
A Theory of the Quasi-Static World
We present the theory behind a novel unsupervised method for discovering quasi-static objects, objects that are stationary during some interval of observation, within image sequen...
Brandon C. S. Sanders, Randal C. Nelson, Rahul Suk...
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 11 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi