Sciweavers

2109 search results - page 283 / 422
» Solving Necklace Constraint Problems
Sort
View
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 3 months ago
The Dichotomy of List Homomorphisms for Digraphs
The Dichotomy Conjecture for Constraint Satisfaction Problems has been verified for conservative problems (or, equivalently, for list homomorphism problems) by Andrei Bulatov. An ...
Pavol Hell, Arash Rafiey
ICIP
2008
IEEE
16 years 6 months ago
Face hallucination VIA sparse coding
In this paper, we address the problem of hallucinating a high resolution face given a low resolution input face. The problem is approached through sparse coding. To exploit the fa...
Jianchao Yang, Hao Tang, Yi Ma, Thomas S. Huang
ICIP
2004
IEEE
16 years 6 months ago
Camera response function recovery from different illuminations of identical subject matter
A robust method of camera response function estimation, using pictures taken by differently illuminating the same subject matter, is presented. The method solves for the response ...
Corey Manders, Chris Aimone, Steve Mann
DCC
2004
IEEE
16 years 4 months ago
Distortion-Optimal Transmission of Progressive Images over Channels with Random Bit Errors and Packet Erasures
We present a statistical optimization framework for solving the end-to-end problem of progressive transmission of images over noisy channels. We consider the impacts of transmissi...
Homayoun Yousefi'zadeh, Hamid Jafarkhani, Farzad E...
152
Voted
ESORICS
2009
Springer
15 years 11 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...