Sciweavers

15073 search results - page 2719 / 3015
» Probabilistic algorithms for computing resultants
Sort
View
ICAT
2007
IEEE
15 years 10 months ago
Compensated Visual Hull for Defective Segmentation and Occlusion
We propose an advanced visual hull technique to compensate for outliers using reliabilities of the silhouettes. The proposed method consists of a foreground extraction technique b...
Hansung Kim, Ryuuki Sakamoto, Itaru Kitahara, Neal...
ICC
2007
IEEE
104views Communications» more  ICC 2007»
15 years 10 months ago
Multiplexing Video on Broadcast Channels via Convex Programs
— We propose a joint power- and rate-control scheme to broadcast a multiplicity of video sequences over a broadcast channel. The formulation is intended to be general in scope, w...
Raju Hormis, Elliot N. Linzer, Xiaodong Wang
ICCCN
2007
IEEE
15 years 10 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
ICDE
2007
IEEE
122views Database» more  ICDE 2007»
15 years 10 months ago
A Comprehensive Motion Videotext Detection Localization and Extraction Method
— In video indexing and summarization, video text is the very compact and accurate information. Most video text detection and extraction methods deal with the static videotext on...
Tsung-Han Tsai, Yung-Chien Chen, Chih-Lun Fang
ICIP
2007
IEEE
15 years 10 months ago
Palmprint Verification using Complex Wavelet Transform
Palmprint is a unique and reliable biometric characteristic with high usability. With the increasing demand of automatic palmprint authentication systems, the development of accur...
Lei Zhang, Zhenhua Guo, Zhou Wang, David Zhang
« Prev « First page 2719 / 3015 Last » Next »