Sciweavers

5344 search results - page 257 / 1069
» Privacy-Preserving Set Operations
Sort
View
121
Voted
ICPR
2006
IEEE
16 years 5 months ago
Type-2 Fuzzy Markov Random Fields to Handwritten Character Recognition
This paper integrates Markov random fields (MRFs) with type-2 fuzzy sets (T2 FSs) referred to as T2 FMRFs, which can handle the fuzziness of the labeling space as well as the rand...
Jia Zeng, Zhi-Qiang Liu
102
Voted
ICPR
2002
IEEE
16 years 5 months ago
A Probabilistic Model for Camera Zoom Detection
Camera motion detection is essential for automated video analysis. We propose a new probabilistic model for detecting zoom-in/zoom-out operations. The model uses EM to estimate th...
Rong Jin, Yanjun Qi, Alexander G. Hauptmann
140
Voted
ICIP
2009
IEEE
16 years 5 months ago
Compressed Sensing Of Natural Images
Compressed sensing (CS) is a new technique for simultaneous data sampling and compression. In this paper, we propose and study block compressed sensing for natural images, where i...
DAC
1999
ACM
16 years 4 months ago
LISA - Machine Description Language for Cycle-Accurate Models of Programmable DSP Architectures
Abstract { This paper presents the machine description language LISA for the generation of bitand cycle accurate models of DSP processors. Based on a behavioral operation descripti...
Stefan Pees, Andreas Hoffmann, Vojin Zivojnovic, H...
MOBISYS
2009
ACM
16 years 4 months ago
StarTrack: a framework for enabling track-based applications
Mobile devices are increasingly equipped with hardware and software services allowing them to determine their locations, but support for building location-aware applications remai...
Ganesh Ananthanarayanan, Maya Haridasan, Iqbal Moh...