Sciweavers

13336 search results - page 2434 / 2668
» Computer Vision: Algorithms and Applications
Sort
View
177
Voted
TCSV
2008
177views more  TCSV 2008»
15 years 4 months ago
An ICA Mixture Hidden Markov Model for Video Content Analysis
In this paper, a new theoretical framework based on hidden Markov model (HMM) and independent component analysis (ICA) mixture model is presented for content analysis of video, nam...
Jian Zhou, Xiao-Ping Zhang
JFP
2000
163views more  JFP 2000»
15 years 4 months ago
Automatic useless-code elimination for HOT functional programs
In this paper we present two type inference systems for detecting useless-code in higher-order typed functional programs. Type inference can be performed in an efficient and compl...
Ferruccio Damiani, Paola Giannini
CIKM
2010
Springer
15 years 3 months ago
Mining interesting link formation rules in social networks
Link structures are important patterns one looks out for when modeling and analyzing social networks. In this paper, we propose the task of mining interesting Link Formation rules...
Cane Wing-ki Leung, Ee-Peng Lim, David Lo, Jianshu...
ISSRE
2010
IEEE
15 years 3 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...
121
Voted
SIAMSC
2010
141views more  SIAMSC 2010»
15 years 2 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
« Prev « First page 2434 / 2668 Last » Next »