Sciweavers

798 search results - page 47 / 160
» Interval Methods: An Introduction
Sort
View
ICIP
2005
IEEE
14 years 12 months ago
An adaptive DCT-based Mod-4 steganographic method
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Xiaojun Qi, KokSheik Wong
ICML
2005
IEEE
14 years 11 months ago
An efficient method for simplifying support vector machines
In this paper we describe a new method to reduce the complexity of support vector machines by reducing the number of necessary support vectors included in their solutions. The red...
DucDung Nguyen, Tu Bao Ho
ICRA
2005
IEEE
171views Robotics» more  ICRA 2005»
14 years 3 months ago
Control Method for a 3D Form Display with Coil-type Shape Memory Alloy
- We previously proposed a new 3D form display actuated by shape memory alloy (SMA), which is capable of displaying large scale objects sequentially. Based on our devised method, o...
Masashi Nakatani, Hiroyuki Kajimoto, Kevin Vlack, ...
ICA
2004
Springer
14 years 3 months ago
An Iterative Blind Source Separation Method for Convolutive Mixtures of Images
The paper deals with blind source separation of images. The model which is adopted here is a convolutive multi-dimensional one. Recent results about polynomial matrices in several ...
Marc Castella, Jean-Christophe Pesquet
ICCS
2009
Springer
14 years 4 months ago
A Second Order Adjoint Method to Targeted Observations
The role of the second order adjoint in targeting strategies is studied and analyzed. Most targeting strategies use the first order adjoint to identify regions where additional in...
Humberto C. Godinez, Dacian N. Daescu