Sciweavers

476 search results - page 26 / 96
» General Constrained Deformations based on Generalized Metaba...
Sort
View
ISCAS
2008
IEEE
217views Hardware» more  ISCAS 2008»
15 years 6 months ago
Approximate L0 constrained non-negative matrix and tensor factorization
— Non-negative matrix factorization (NMF), i.e. V ≈ WH where both V, W and H are non-negative has become a widely used blind source separation technique due to its part based r...
Morten Mørup, Kristoffer Hougaard Madsen, L...
MOBIHOC
2006
ACM
15 years 11 months ago
Balancing distance and lifetime in delay constrained ad hoc networks
This paper addresses the problem of optimizing the packet transmission schedule in an ad hoc network with end-toend delay constraints. The emphasis is to determine the proper rela...
Ben Liang, Min Dong
IPPS
2003
IEEE
15 years 5 months ago
Constrained Component Deployment in Wide-Area Networks Using AI Planning Techniques
Component-based models represent a dominant trend in the construction of wide-area network applications, making possible the integration of diverse functionality contained in modu...
Tatiana Kichkaylo, Anca-Andreea Ivan, Vijay Karamc...
CVPR
2004
IEEE
16 years 1 months ago
MetaMorphs: Deformable Shape and Texture Models
We present a new class of deformable models, MetaMorphs, whose formulation integrates both shape and interior texture. The model deformations are derived from both boundary and re...
Xiaolei Huang, Dimitris N. Metaxas, Ting Chen
ICASSP
2008
IEEE
15 years 6 months ago
Combination of strongly and weakly constrained recognizers for reliable detection of OOVS
This paper addresses the detection of OOV segments in the output of large vocabulary continuous speech recognition (LVCSR) system. First, standard confidence measures based on fr...
Lukas Burget, Petr Schwarz, Pavel Matejka, Mirko H...