Sciweavers

1717 search results - page 131 / 344
» Error concealment using a diffusion based method
Sort
View
SIPS
2006
IEEE
15 years 9 months ago
Carry Prediction and Selection for Truncated Multiplication
This paper presents an error compensation method for truncated multiplication. From two n-bit operands, the operator produces an n-bit product with small error compared to the 2n-b...
Romain Michard, Arnaud Tisserand, Nicolas Veyrat-C...
ICDM
2003
IEEE
71views Data Mining» more  ICDM 2003»
15 years 8 months ago
Tree-structured Partitioning Based on Splitting Histograms of Distances
We propose a novel clustering algorithm that is similar in spirit to classification trees. The data is recursively split using a criterion that applies a discrete curve evolution...
Longin Jan Latecki, Rajagopal Venugopal, Marc Sobe...
WACV
2005
IEEE
15 years 8 months ago
Dental Biometrics: Alignment and Matching of Dental Radiographs
—Dental biometrics utilizes dental radiographs for human identification. The dental radiographs provide information about teeth, including tooth contours, relative positions of n...
Hong Chen, Anil K. Jain
INFORMATICALT
2002
136views more  INFORMATICALT 2002»
15 years 2 months ago
Comparison of Poisson Mixture Models for Count Data Clusterization
Abstract. Five methods for count data clusterization based on Poisson mixture models are described. Two of them are parametric, the others are semi-parametric. The methods emlploy ...
Jurgis Susinskas, Marijus Radavicius
GLOBECOM
2007
IEEE
15 years 9 months ago
Resource Allocation for Amplify-and-Forward Relay Networks with Differential Modulation
— The optimum resource allocation is an important method to improve the error performance and energy efficiency of wireless relay networks. In this paper, we consider the resour...
Woong Cho, Liuqing Yang