Sciweavers

5948 search results - page 374 / 1190
» Computing Robust Counter-Strategies
Sort
View
TSP
2010
14 years 11 months ago
Independent component analysis by entropy bound minimization
A novel (differential) entropy estimator is introduced where the maximum entropy bound is used to approximate the entropy given the observations, and is computed using a numerical ...
Xi-Lin Li, Tülay Adali
TSP
2010
14 years 11 months ago
Greedy gossip with eavesdropping
Abstract-- This paper presents greedy gossip with eavesdropping (GGE), a new average consensus algorithm for wireless sensor network applications. Consensus algorithms have recentl...
Deniz Üstebay, Boris N. Oreshkin, Mark Coates...
ICASSP
2011
IEEE
14 years 8 months ago
Efficient coherent phase quantization for audio watermarking
The weighted overlap add (WOLA) technique is routinely used in audio processing to avoid introducing audible clicks. This process introduces inter-dependencies between WOLA coeffi...
Xiao-Ming Chen, Gwenaël J. Doërr, Michae...
ICASSP
2011
IEEE
14 years 8 months ago
Real-time and multi-view face tracking on mobile platform
The development of mobile platform has raised an emergent requirement for face-related multimedia applications. However, as the basis of such applications, face detection and trac...
Lei Xu, Jiangwei Li, Kongqiao Wang
ICASSP
2011
IEEE
14 years 8 months ago
Effective multi-resolution background subtraction
In this paper, we propose a novel multi-resolution background subtraction method. We adopt coarse to fine strategy, which is the essence the multi-resolution scheme, to obtain th...
LingFeng Wang, Chunhong Pan