Sciweavers

1717 search results - page 40 / 344
» Error concealment using a diffusion based method
Sort
View
SIAMSC
2008
125views more  SIAMSC 2008»
14 years 9 months ago
Hybrid Simulations of Reaction-Diffusion Systems in Porous Media
Abstract. Hybrid or multiphysics algorithms provide an efficient computational tool for combining micro- and macroscale descriptions of physical phenomena. Their use becomes impera...
Alexandre M. Tartakovsky, Daniel M. Tartakovsky, T...
ASPDAC
2008
ACM
83views Hardware» more  ASPDAC 2008»
14 years 11 months ago
Run-time power gating of on-chip routers using look-ahead routing
Since on-chip routers in Network-on-Chips play a key role in on-chip communication between cores, they should be always preparing for packet injections even if a part of cores are ...
Hiroki Matsutani, Michihiro Koibuchi, Hideharu Ama...
SDM
2010
SIAM
166views Data Mining» more  SDM 2010»
14 years 11 months ago
A Permutation Approach to Validation
We give a permutation approach to validation (estimation of out-sample error). One typical use of validation is model selection. We establish the legitimacy of the proposed permut...
Malik Magdon-Ismail, Konstantin Mertsalov
MVA
1990
14 years 11 months ago
Determining Surface Orientation by Uni-directional Photometric Flow Fields
In the Shape from Shading methods, an extended approach named Uni-directional Photometric Flow Fields is proposed in this paper. The reflectance property of the surface material i...
Hidekazu Tanaka, Yuji Iwahori, Naohiro Ishii
ICDAR
2009
IEEE
15 years 4 months ago
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition
A camera-based online signature verification system is proposed in this paper. One web camera is used for data acquisition, and a sequential Monte Carlo method is used for tracki...
Daigo Muramatsu, Kumiko Yasuda, Takashi Matsumoto