Sciweavers

1717 search results - page 123 / 344
» Error concealment using a diffusion based method
Sort
View
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 9 months ago
Comparing Different Transmission Strategies Using Turbo Codes for Nonuniform Memoryless Sources
— Nonuniform sources can be found in real world applications as uncompressed speech, text and medical images. In this paper we compare the performance of three different methods ...
Gilberto Titericz Jr., Richard Demo Souza, Javier ...
83
Voted
PR
2006
80views more  PR 2006»
15 years 2 months ago
Neighborhood size selection in the k-nearest-neighbor rule using statistical confidence
The k-nearest-neighbor rule is one of the most attractive pattern classification algorithms. In practice, the choice of k is determined by the cross-validation method. In this wor...
Jigang Wang, Predrag Neskovic, Leon N. Cooper
PKDD
2010
Springer
158views Data Mining» more  PKDD 2010»
15 years 1 months ago
Learning Sparse Gaussian Markov Networks Using a Greedy Coordinate Ascent Approach
In this paper, we introduce a simple but efficient greedy algorithm, called SINCO, for the Sparse INverse COvariance selection problem, which is equivalent to learning a sparse Ga...
Katya Scheinberg, Irina Rish
TIP
2010
277views more  TIP 2010»
14 years 9 months ago
Distance Regularized Level Set Evolution and Its Application to Image Segmentation
Level set methods have been widely used in image processing and computer vision. In conventional level set formulations, the level set function typically develops irregularities du...
Chunming Li, Chenyang Xu, Changfeng Gui, Martin D....
MICCAI
2009
Springer
16 years 4 months ago
Toward Video-Based Navigation for Endoscopic Endonasal Skull Base Surgery
Abstract. Endoscopic endonasal skull base surgery (ESBS) requires high accuracy to ensure safe navigation of the critical anatomy at the anterior skull base. Current navigation sys...
Daniel Mirota, Hanzi Wang, Russell H. Taylor, M...