Sciweavers

139 search results - page 24 / 28
» A Singular Value Thresholding Algorithm for Matrix Completio...
Sort
View
DATE
2005
IEEE
176views Hardware» more  DATE 2005»
13 years 9 months ago
LORD: A Localized, Reactive and Distributed Protocol for Node Scheduling in Wireless Sensor Networks
The lifetime of wireless sensor networks can be increased by minimizing the number of active nodes that provide complete coverage, while switching off the rest. In this paper, we ...
Arijit Ghosh, Tony Givargis
ICPPW
2002
IEEE
14 years 18 days ago
Hebbian Algorithms for a Digital Library Recommendation System
generally meta-data, so that documents on any specific subject can be transparently retrieved. While quality control can in principle still rely on the traditional methods of peer-...
Francis Heylighen, Johan Bollen
BMCBI
2010
130views more  BMCBI 2010»
13 years 7 months ago
Amino acid "little Big Bang": Representing amino acid substitution matrices as dot products of Euclidian vectors
Background: Sequence comparisons make use of a one-letter representation for amino acids, the necessary quantitative information being supplied by the substitution matrices. This ...
Karel Zimmermann, Jean-François Gibrat
TIP
2008
302views more  TIP 2008»
13 years 7 months ago
Adaptive Pseudo Dilation for Gestalt Edge Grouping and Contour Detection
We consider the problem of detecting object contours in natural images. In many cases, local luminance changes turn out to be stronger in textured areas than on object contours. Th...
Giuseppe Papari, Nicolai Petkov
ITIIS
2010
183views more  ITIIS 2010»
13 years 6 months ago
Reversible Watermarking Method Using Optimal Histogram Pair Shifting Based on Prediction and Sorting
To be reversible as a data hiding method, the original content and hidden message should be completely recovered. One important objective of this approach is to achieve high embed...
Hee Joon Hwang, Hyoung Joong Kim, Vasiliy Sachnev,...