Sciweavers

2237 search results - page 347 / 448
» On the Security of Random Sources
Sort
View
ICIP
2006
IEEE
15 years 11 months ago
Stochastic Approach to Separate Diffuse and Specular Reflections
This paper presents separation of specular and diffuse reflection components from an image pair. The proposed approach is based on the dichromatic reflectance model and Markov ran...
Sang Hwa Lee, Hyung il Koo, Nam Ik Cho, Jong-Il Pa...
MOBIHOC
2009
ACM
15 years 10 months ago
A practical joint network-channel coding scheme for reliable communication in wireless networks
In this paper, we propose a practical scheme, called Non-Binary Joint Network-Channel Decoding (NB-JNCD) for reliable communication in wireless networks. It seamlessly couples cha...
Zheng Guo, Jie Huang, Bing Wang, Jun-Hong Cui, She...
KDD
2007
ACM
132views Data Mining» more  KDD 2007»
15 years 10 months ago
A scalable modular convex solver for regularized risk minimization
A wide variety of machine learning problems can be described as minimizing a regularized risk functional, with different algorithms using different notions of risk and different r...
Choon Hui Teo, Alex J. Smola, S. V. N. Vishwanatha...
DCC
2010
IEEE
15 years 4 months ago
On the Systematic Measurement Matrix for Compressed Sensing in the Presence of Gross Errors
Inspired by syndrome source coding using linear error-correcting codes, we explore a new form of measurement matrix for compressed sensing. The proposed matrix is constructed in t...
Zhi Li, Feng Wu, John Wright
ISBI
2009
IEEE
15 years 4 months ago
Automated Analysis of Human Protein Atlas Immunofluorescence Images
The Human Protein Atlas is a rich source of location proteomics data. In this work, we present an automated approach for processing and classifying major subcellular patterns in t...
Justin Newberg, Jieyue Li, Arvind Rao, Fredrik Pon...