Sciweavers

10296 search results - page 78 / 2060
» Distribution of Mutual Information
Sort
View
IJCV
2008
147views more  IJCV 2008»
13 years 10 months ago
Shape-Based Mutual Segmentation
We present a novel variational approach for simultaneous segmentation of two images of the same object taken from different viewpoints. Due to noise, clutter and occlusions, neith...
Tammy Riklin-Raviv, Nir A. Sochen, Nahum Kiryati
MSS
2010
IEEE
97views Hardware» more  MSS 2010»
13 years 8 months ago
Network formation under mutual consent and costly communication
We consider four different game-theoretic approaches to describe the formation of social networks under mutual consent and costly communication. First, we consider Jackson-Wolins...
Robert P. Gilles, Sudipta Sarangi
CEC
2008
IEEE
14 years 4 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
KDD
2007
ACM
206views Data Mining» more  KDD 2007»
14 years 10 months ago
Automatic labeling of multinomial topic models
Multinomial distributions over words are frequently used to model topics in text collections. A common, major challenge in applying all such topic models to any text mining proble...
Qiaozhu Mei, Xuehua Shen, ChengXiang Zhai
IH
2005
Springer
14 years 3 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...