Sciweavers

325 search results - page 7 / 65
» Analysis of the constraint proposal method for two-party neg...
Sort
View
SMI
2006
IEEE
122views Image Analysis» more  SMI 2006»
14 years 1 months ago
A Constrained Least Squares Approach to Interactive Mesh Deformation
In this paper, we propose a constrained least squares approach for stably computing Laplacian deformation with strict positional constraints. In the existing work on Laplacian def...
Yasuhiro Yoshioka, Hiroshi Masuda, Yoshiyuki Furuk...
ICMCS
2006
IEEE
101views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Emotional Speech Synthesis using Subspace Constraints in Prosody
An efficient speech synthesis method that uses subspace constraint in prosody is proposed. Conventional unit selection methods concatenate speech segments stored in database, tha...
Shinya Mori, Tsuyoshi Moriyama, Shinji Ozawa
MMSEC
2004
ACM
95views Multimedia» more  MMSEC 2004»
14 years 24 days ago
An improved attack analysis on a public-key spread spectrum watermarking
We analyze the fingerprinting method in [1] and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available i...
Mustafa Kesal, Mehmet Kivanç Mihçak,...
SAC
2006
ACM
14 years 1 months ago
Spatial geometric constraint solving based on k-connected graph decomposition
We propose a geometric constraint solving method based on connectivity analysis in graph theory, which can be used to decompose a well-constrained problem into some smaller ones i...
Gui-Fang Zhang, Xiao-Shan Gao
ICASSP
2009
IEEE
14 years 2 months ago
Blind Monte Carlo detection-estimation method for optical coherence tomography
We consider the parametric analysis of frequency-domain optical coherence tomography (OCT) signals. A Monte Carlo (Gibbs sampler) detection-estimation method for determining the d...
Georg Kail, Clemens Novak, Bernd Hofer, Franz Hlaw...