Sciweavers

2027 search results - page 290 / 406
» When is it best to best-respond
Sort
View
CORR
2011
Springer
200views Education» more  CORR 2011»
14 years 8 months ago
An Analysis of Optimal Link Bombs
We analyze the recent phenomenon termed a Link Bomb, and investigate the optimal attack pattern for a group of web pages attempting to link bomb a specific web page. The typical ...
Sibel Adali, Tina Liu, Malik Magdon-Ismail
CORR
2011
Springer
146views Education» more  CORR 2011»
14 years 8 months ago
Refined bounds on the number of connected components of sign conditions on a variety
Let R be a real closed field, P, Q ⊂ R[X1, . . . , Xk] finite subsets of polynomials, with the degrees of the polynomials in P (resp. Q) bounded by d (resp. d0). Let V ⊂ Rk b...
Sal Barone, Saugata Basu
PAMI
2011
14 years 8 months ago
Revisiting Linear Discriminant Techniques in Gender Recognition
—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
Juan Bekios-Calfa, José Miguel Buenaposada,...
TIP
2011
84views more  TIP 2011»
14 years 8 months ago
Optimal Inversion of the Anscombe Transformation in Low-Count Poisson Image Denoising
—The removal of Poisson noise is often performed through the following three-step procedure. First, the noise variance is stabilized by applying the Anscombe root transformation ...
Markku Makitalo, Alessandro Foi
ICASSP
2010
IEEE
14 years 8 months ago
Using reed-muller sequences as deterministic compressed sensing matrices for image reconstruction
An image reconstruction algorithm using compressed sensing (CS) with deterministic matrices of second-order ReedMuller (RM) sequences is introduced. The 1D algorithm of Howard et ...
Kangyu Ni, Somantika Datta, Prasun Mahanti, Svetla...