Sciweavers

9572 search results - page 1777 / 1915
» Cover Algorithms and Their Combination
Sort
View
RAS
2010
136views more  RAS 2010»
15 years 2 months ago
A realistic benchmark for visual indoor place recognition
An important competence for a mobile robot system is the ability to localize and perform context interpretation. This is required to perform basic navigation and to facilitate loc...
Andrzej Pronobis, Barbara Caputo, Patric Jensfelt,...
SIAMJO
2010
83views more  SIAMJO 2010»
15 years 2 months ago
The Lifted Newton Method and Its Application in Optimization
Abstract. We present a new “lifting” approach for the solution of nonlinear optimization problems (NLPs) that have objective and constraint functions with intermediate variable...
Jan Albersmeyer, Moritz Diehl
118
Voted
SIAMSC
2010
141views more  SIAMSC 2010»
15 years 2 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
SPEECH
2010
152views more  SPEECH 2010»
15 years 2 months ago
Single-channel speech enhancement using spectral subtraction in the short-time modulation domain
In this paper we investigate the modulation domain as an alternative to the acoustic domain for speech enhancement. More specifically, we wish to determine how competitive the mo...
Kuldip K. Paliwal, Kamil Wójcicki, Belinda ...
TDSC
2010
218views more  TDSC 2010»
15 years 2 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
« Prev « First page 1777 / 1915 Last » Next »