Sciweavers

1717 search results - page 206 / 344
» Error concealment using a diffusion based method
Sort
View
MTA
2011
260views Hardware» more  MTA 2011»
14 years 5 months ago
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a ne...
Vivekananda Bhat K., Indranil Sengupta, Abhijit Da...
88
Voted
ICMLA
2008
14 years 11 months ago
Tumor Targeting for Lung Cancer Radiotherapy Using Machine Learning Techniques
Accurate lung tumor targeting in real time plays a fundamental role in image-guide radiotherapy of lung cancers. Precise tumor targeting is required for both respiratory gating an...
Tong Lin, Laura Cervino, Xiaoli Tang, Nuno Vasconc...
ICCV
2007
IEEE
16 years 2 days ago
Spatio-Temporal Shape from Silhouette using Four-Dimensional Delaunay Meshing
We propose a novel method for computing a fourdimensional (4D) representation of the spatio-temporal visual hull of a dynamic scene, based on an extension of a recent provably cor...
Ehsan Aganj, Jean-Philippe Pons, Florent Sé...
TWC
2010
14 years 4 months ago
MMSE Based Transceiver Designs in Closed-Loop Non-Regenerative MIMO Relaying Systems
In this paper, we propose a new design strategy based on the minimum mean-squared error (MMSE) in closedloop non-regenerative multiple-input multiple-output (MIMO) relaying system...
Chang-Ick Song, Kyoung-Jae Lee, Inkyu Lee
ICIP
2002
IEEE
15 years 11 months ago
Boosting face recognition on a large-scale database
Performance of many state-of-the-art face recognition (FR) methods deteriorates rapidly, when large in size databases are considered. In this paper, we propose a novel clustering ...
Juwei Lu, Konstantinos N. Plataniotis