Sciweavers

4335 search results - page 704 / 867
» Privatizing Constraint Optimization
Sort
View
92
Voted
ICIP
2002
IEEE
16 years 3 months ago
Edge-preserving image reconstruction for coherent imaging applications
We propose a method for edge-preserving regularized reconstruction in coherent imaging systems. In our framework, image formation from measured data is achieved through the minimi...
Alan S. Willsky, Müjdat Çetin, William...
ICIP
2002
IEEE
16 years 3 months ago
Nonparametric methods for image segmentation using information theory and curve evolution
In this paper, we present a novel information theoretic approach to image segmentation. We cast the segmentation problem as the maximization of the mutual information between the ...
Alan S. Willsky, Anthony J. Yezzi Jr., John W. Fis...
116
Voted
ICIP
2001
IEEE
16 years 3 months ago
Minimizing transmission energy in wireless video communications
A key constraint in mobile communications is the reliance on a battery with a limited energy supply. Efficiently utilizing the available energy is therefore an important design co...
Yiftach Eisenberg, Thrasyvoulos N. Pappas, Randall...
ICIP
1995
IEEE
16 years 3 months ago
Parallel programmable video co-processor design
Modern video applications call for computationally intensive data processing at very high data rate. In order to meet the high-performance/low-cost constraints, the stateof-the-ar...
An-Yeu Wu, K. J. Ray Liu, Arun Raghupathy, Shang-C...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 3 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu