Sciweavers

1717 search results - page 248 / 344
» Error concealment using a diffusion based method
Sort
View
ICDE
2012
IEEE
343views Database» more  ICDE 2012»
13 years 12 days ago
Bi-level Locality Sensitive Hashing for k-Nearest Neighbor Computation
We present a new Bi-level LSH algorithm to perform approximate k-nearest neighbor search in high dimensional spaces. Our formulation is based on a two-level scheme. In the first ...
Jia Pan, Dinesh Manocha
ICIP
2005
IEEE
15 years 3 months ago
Two-step variance-adaptive image denoising
Abstract— In this paper, we describe a two-step varianceadaptive method for image denoising based on a statistical model of the coefficients of balanced multiwavelet transform. ...
Lahouari Ghouti, Ahmed Bouridane
MEDIAFORENSICS
2010
14 years 8 months ago
Image dependent log-likelihood ratio allocation for repeat accumulate code-based decoding in data hiding channels
Error correction codes of suitable redundancy are used for ensuring perfect data recovery in noisy channels. For iterative decoding based methods, the decoder needs to be initiali...
Anindya Sarkar, B. S. Manjunath
CIKM
2008
Springer
14 years 12 months ago
Academic conference homepage understanding using constrained hierarchical conditional random fields
We address the problem of academic conference homepage understanding for the Semantic Web. This problem consists of three labeling tasks - labeling conference function pages, func...
Xin Xin, Juanzi Li, Jie Tang, Qiong Luo
3DOR
2008
14 years 11 months ago
A 3D Face Recognition Algorithm Using Histogram-based Features
We present an automatic face recognition approach, which relies on the analysis of the three-dimensional facial surface. The proposed approach consists of two basic steps, namely ...
Xuebing Zhou, Helmut Seibert, Christoph Busch, Wol...