Sciweavers

5398 search results - page 80 / 1080
» Markov Face Models
Sort
View
PE
2002
Springer
124views Optimization» more  PE 2002»
13 years 8 months ago
Continuous-time hidden Markov models for network performance evaluation
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer the...
Wei Wei, Bing Wang, Donald F. Towsley
ICASSP
2011
IEEE
13 years 18 days ago
Optimal radio access in femtocell networks based on markov modeling of interferers' activity
One of the most critical issues in femtocell network deployment is interference management, especially for femtocells sharing the spectrum occupied by conventional cellular networ...
Sergio Barbarossa, Alessandro Carfagna, Stefania S...
ICA
2012
Springer
12 years 4 months ago
Audio Imputation Using the Non-negative Hidden Markov Model
Abstract. Missing data in corrupted audio recordings poses a challenging problem for audio signal processing. In this paper we present an approach that allows us to estimate missin...
Jinyu Han, Gautham J. Mysore, Bryan Pardo
ICCV
2007
IEEE
14 years 10 months ago
Embedded Profile Hidden Markov Models for Shape Analysis
An ideal shape model should be both invariant to global transformations and robust to local distortions. In this paper we present a new shape modeling framework that achieves both...
Rui Huang, Vladimir Pavlovic, Dimitris N. Metaxas
IEEEARES
2010
IEEE
14 years 3 months ago
A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems
—Survivability modeling and evaluation have gained increasing importance. Most existing models assume that the distributions for transitions between states are exponential. Howev...
Alex Hai Wang, Su Yan, Peng Liu