Sciweavers

1717 search results - page 206 / 344
» Error concealment using a diffusion based method
Sort
View
134
Voted
MTA
2011
260views Hardware» more  MTA 2011»
14 years 9 months ago
An audio watermarking scheme using singular value decomposition and dither-modulation quantization
Quantization index modulation is one of the best methods for performing blind watermarking, due to its simplicity and good rate-distortion-robustness tradeoffs. In this paper, a ne...
Vivekananda Bhat K., Indranil Sengupta, Abhijit Da...
124
Voted
ICMLA
2008
15 years 4 months ago
Tumor Targeting for Lung Cancer Radiotherapy Using Machine Learning Techniques
Accurate lung tumor targeting in real time plays a fundamental role in image-guide radiotherapy of lung cancers. Precise tumor targeting is required for both respiratory gating an...
Tong Lin, Laura Cervino, Xiaoli Tang, Nuno Vasconc...
105
Voted
ICCV
2007
IEEE
16 years 4 months ago
Spatio-Temporal Shape from Silhouette using Four-Dimensional Delaunay Meshing
We propose a novel method for computing a fourdimensional (4D) representation of the spatio-temporal visual hull of a dynamic scene, based on an extension of a recent provably cor...
Ehsan Aganj, Jean-Philippe Pons, Florent Sé...
211
Voted
TWC
2010
14 years 9 months ago
MMSE Based Transceiver Designs in Closed-Loop Non-Regenerative MIMO Relaying Systems
In this paper, we propose a new design strategy based on the minimum mean-squared error (MMSE) in closedloop non-regenerative multiple-input multiple-output (MIMO) relaying system...
Chang-Ick Song, Kyoung-Jae Lee, Inkyu Lee
121
Voted
ICIP
2002
IEEE
16 years 4 months ago
Boosting face recognition on a large-scale database
Performance of many state-of-the-art face recognition (FR) methods deteriorates rapidly, when large in size databases are considered. In this paper, we propose a novel clustering ...
Juwei Lu, Konstantinos N. Plataniotis