Sciweavers

5948 search results - page 887 / 1190
» Computing Robust Counter-Strategies
Sort
View
DCC
2007
IEEE
16 years 4 months ago
High-Rate Analysis of Systematic Lossy Error Protection of a Predictively Encoded Source
We consider a first-order Markov source, which is predictively encoded using a DPCM-style encoder. The quantized compressed prediction residual is transmitted over an erasure chan...
Shantanu Rane, David Rebollo-Monedero, Bernd Girod
MOBIHOC
2003
ACM
16 years 4 months ago
Localization from mere connectivity
It is often useful to know the geographic positions of nodes in a communications network, but adding GPS receivers or other sophisticated sensors to every node can be expensive. W...
Yi Shang, Wheeler Ruml, Ying Zhang, Markus P. J. F...
CVPR
2007
IEEE
16 years 2 months ago
Partially Occluded Object-Specific Segmentation in View-Based Recognition
We present a novel object-specific segmentation method which can be used in view-based object recognition systems. Previous object segmentation approaches generate inexact results ...
Minsu Cho (Seoul National University), Kyoung Mu L...
139
Voted
SDM
2009
SIAM
208views Data Mining» more  SDM 2009»
16 years 1 months ago
A Bayesian Approach Toward Finding Communities and Their Evolutions in Dynamic Social Networks.
Although a large body of work are devoted to finding communities in static social networks, only a few studies examined the dynamics of communities in evolving social networks. I...
Tianbao Yang, Yun Chi, Shenghuo Zhu, Yihong Gong, ...
CVPR
2010
IEEE
16 years 1 months ago
Finding Dots: Segmentation as Popping out Regions from Boundaries
Many applications need to segment out all small round regions in an image. This task of finding dots can be viewed as a region segmentation problem where the dots form one regio...
Elena Bernardis, Stella Yu