Sciweavers

1717 search results - page 191 / 344
» Error concealment using a diffusion based method
Sort
View
IROS
2009
IEEE
151views Robotics» more  IROS 2009»
15 years 4 months ago
A comparison of SLAM algorithms based on a graph of relations
— In this paper, we address the problem of creating an objective benchmark for comparing SLAM approaches. We propose a framework for analyzing the results of SLAM approaches base...
Wolfram Burgard, Cyrill Stachniss, Giorgio Grisett...
ICASSP
2011
IEEE
14 years 1 months ago
Improving text-independent phonetic segmentation based on the Microcanonical Multiscale Formalism
In an earlier work, we proposed a novel phonetic segmentation method based on speech analysis under the Microcanonical Multiscale Formalism (MMF). The latter relies on the computa...
Vahid Khanagha, Khalid Daoudi, Oriol Pont, Hussein...
WWW
2009
ACM
15 years 11 months ago
What makes conversations interesting?: themes, participants and consequences of conversations in online social media
Rich media social networks promote not only creation and consumption of media, but also communication about the posted media item. What causes a conversation to be interesting, th...
Ajita John, Dorée D. Seligmann, Hari Sundar...
62
Voted
PAMI
1998
74views more  PAMI 1998»
14 years 10 months ago
Selecting the Optimal Focus Measure for Autofocusing and Depth-From-Focus
—A method is described for selecting the optimal focus measure with respect to gray-level noise from a given set of focus measures in passive autofocusing and depth-from-focus ap...
Muralidhara Subbarao, Jenn-Kwei Tyan
PVLDB
2010
99views more  PVLDB 2010»
14 years 8 months ago
Towards Certain Fixes with Editing Rules and Master Data
A variety of integrity constraints have been studied for data cleaning. While these constraints can detect the presence of errors, they fall short of guiding us to correct the err...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Weny...