Sciweavers

3096 search results - page 167 / 620
» Theory and Use of the EM Algorithm
Sort
View
134
Voted
ICIP
2007
IEEE
15 years 11 months ago
Graph-Cut Rate Distortion Algorithm for Contourlet-Based Image Compression
The geometric features of images, such as edges, are difficult to represent. When a redundant transform is used for their extraction, the compression challenge is even more dif...
Maria Trocan, Béatrice Pesquet-Popescu, Jam...
130
Voted
CPHYSICS
2007
103views more  CPHYSICS 2007»
15 years 5 months ago
Algorithms for the evolution of electronic properties in nanocrystals
We illustrate recent progress in developing algorithms for solving the Kohn-Sham problem. Key ingredients of our algorithm include pseudopotentials implemented on a real space gri...
James R. Chelikowsky, Murilo L. Tiago, Yousef Saad...
121
Voted
AI
2005
Springer
15 years 5 months ago
First order LUB approximations: characterization and algorithms
One of the major approaches to approximation of logical theories is the upper and lower bounds approach introduced in (Selman and Kautz, 1991, 1996). In this paper, we address the...
Alvaro del Val
133
Voted
MCS
2010
Springer
15 years 3 months ago
Application of Biased Metropolis Algorithms: From protons to proteins
We show that sampling with a biased Metropolis scheme is essentially equivalent to using the heatbath algorithm. However, the biased Metropolis method can also be applied when an ...
Alexei Bazavov, Bernd A. Berg, Huan-Xiang Zhou
172
Voted
ICNS
2007
IEEE
15 years 11 months ago
Data fusion algorithms for network anomaly detection: classification and evaluation
In this paper, the problem of discovering anomalies in a large-scale network based on the data fusion of heterogeneous monitors is considered. We present a classification of anoma...
Vasilis Chatzigiannakis, Georgios Androulidakis, K...