Sciweavers

10296 search results - page 78 / 2060
» Distribution of Mutual Information
Sort
View
IJCV
2008
147views more  IJCV 2008»
15 years 3 months ago
Shape-Based Mutual Segmentation
We present a novel variational approach for simultaneous segmentation of two images of the same object taken from different viewpoints. Due to noise, clutter and occlusions, neith...
Tammy Riklin-Raviv, Nir A. Sochen, Nahum Kiryati
MSS
2010
IEEE
97views Hardware» more  MSS 2010»
15 years 1 months ago
Network formation under mutual consent and costly communication
We consider four different game-theoretic approaches to describe the formation of social networks under mutual consent and costly communication. First, we consider Jackson-Wolins...
Robert P. Gilles, Sudipta Sarangi
CEC
2008
IEEE
15 years 10 months ago
Fast symmetric keys generation via mutual mirroring process
—This paper presents an eavesdropper-proof algorithm that is capable of fast generating symmetric (secret) keys. Instead of literally exchanging secret keys, both the sender and ...
Chun-Shun Tseng, Ya-Yun Jheng, Sih-Yin Shen, Jung-...
148
Voted
KDD
2007
ACM
206views Data Mining» more  KDD 2007»
16 years 3 months ago
Automatic labeling of multinomial topic models
Multinomial distributions over words are frequently used to model topics in text collections. A common, major challenge in applying all such topic models to any text mining proble...
Qiaozhu Mei, Xuehua Shen, ChengXiang Zhai
127
Voted
IH
2005
Springer
15 years 9 months ago
Information-Theoretic Analysis of Security in Side-Informed Data Hiding
Abstract. In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify th...
Luis Pérez-Freire, Pedro Comesaña, F...