Sciweavers

110 search results - page 6 / 22
» Correlation exploitation in error ranking
Sort
View
ICIP
2001
IEEE
14 years 9 months ago
A temporal error concealment method for MPEG coded video using a multi-frame boundary matching algorithm
Compressed video sequences are very sensitive to channel disturbances when they are transmitted through an unreliable environment such as a wireless channel. The transmission erro...
Yen-Chi Lee, Yucel Altunbasak, Russell M. Merserea...
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
14 years 1 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
CVPR
2010
IEEE
14 years 1 months ago
Image Retrieval via Probabilistic Hypergraph Ranking
In this paper, we propose a new transductive learning framework for image retrieval, in which images are taken as vertices in a weighted hypergraph and the task of image search is...
Yuchi Huang, Qingshan Liu, Shaoting Zhang, Metaxas...
CCIA
2009
Springer
13 years 8 months ago
Measuring Interest of Human Dyadic Interactions
In this paper, we argue that only using behavioural motion information, we are able to predict the interest of observers when looking at face-to-face interactions. We propose a set...
Sergio Escalera, Oriol Pujol, Petia Radeva, Jordi ...
VTC
2010
IEEE
176views Communications» more  VTC 2010»
13 years 6 months ago
Exploiting Redundancy in Iterative H.264 Joint Source and Channel Decoding For Robust Video Transmission
— In this paper we propose joint optimisation of soft-bit assisted iterative joint source and channel decoding with the aid of our proposed EXIT chart optimised redundant source ...
Nasruminallah, Lajos Hanzo