Sciweavers

14936 search results - page 2956 / 2988
» Can They Take It With Them
Sort
View
PAMI
2010
265views more  PAMI 2010»
13 years 5 months ago
Motion Segmentation in the Presence of Outlying, Incomplete, or Corrupted Trajectories
—In this paper, we study the problem of segmenting tracked feature point trajectories of multiple moving objects in an image sequence. Using the affine camera model, this proble...
Shankar Rao, Roberto Tron, René Vidal, Yi M...
PVLDB
2010
164views more  PVLDB 2010»
13 years 5 months ago
FlashStore: High Throughput Persistent Key-Value Store
We present FlashStore, a high throughput persistent keyvalue store, that uses flash memory as a non-volatile cache between RAM and hard disk. FlashStore is designed to store the ...
Biplob Debnath, Sudipta Sengupta, Jin Li
PVLDB
2010
172views more  PVLDB 2010»
13 years 5 months ago
Secure Personal Data Servers: a Vision Paper
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Citizen themselves often count on in...
Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yan...
SIAMSC
2010
141views more  SIAMSC 2010»
13 years 5 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
SIGPRO
2010
88views more  SIGPRO 2010»
13 years 5 months ago
Data compression using SVD and Fisher information for radar emitter location
: This paper presents a data compression method that can achieve a very large compression ratio for radar pulse trains that are to be used for time-difference-of-arrival/frequency-...
Mark L. Fowler, Mo Chen, J. Andrew Johnson, Zhen Z...
« Prev « First page 2956 / 2988 Last » Next »