Sciweavers

1717 search results - page 210 / 344
» Error concealment using a diffusion based method
Sort
View
FOCS
2003
IEEE
15 years 3 months ago
Proving Hard-Core Predicates Using List Decoding
We introduce a unifying framework for proving that predicate P is hard-core for a one-way function f, and apply it to a broad family of functions and predicates, reproving old res...
Adi Akavia, Shafi Goldwasser, Shmuel Safra

Publication
331views
16 years 9 months ago
On Accurate and Efficient Statistical Counting in Sensor-Based Surveillance Systems
Sensor networks have been used in many surveillance systems, providing statistical information about monitored areas. Accurate counting information (e.g., the distribution of the ...
Shuo Guo, Tian He, Mohamed F. Mokbel, John A. Stan...
TASLP
2008
104views more  TASLP 2008»
14 years 10 months ago
A New Model-Based Algorithm for Optimizing the MPEG-AAC in MS-Stereo
Abstract--In this paper, a new model-based algorithm for optimizing the MPEG-Advanced Audio Coder (AAC) in MS-stereo mode is presented. This algorithm is an extension to stereo sig...
Olivier Derrien, Gaël Richard
ICASSP
2009
IEEE
14 years 7 months ago
A reduced-reference video structural similarity metric based on no-reference estimation of channel-induced distortion
The reduced-reference (RR) approximation of a full-reference (FR) video quality assessment method is a convenient way to build evaluation metrics which are both intrinsically well...
Andrea Albonico, Giuseppe Valenzise, Matteo Naccar...
CVPR
2006
IEEE
16 years 4 days ago
Learning Boosted Asymmetric Classifiers for Object Detection
Object detection can be posted as those classification tasks where the rare positive patterns are to be distinguished from the enormous negative patterns. To avoid the danger of m...
Xinwen Hou, Cheng-Lin Liu, Tieniu Tan