Sciweavers

857 search results - page 100 / 172
» Maximum Entropy Utility
Sort
View
CORR
2007
Springer
87views Education» more  CORR 2007»
13 years 8 months ago
Double Sided Watermark Embedding and Detection with Perceptual Analysis
—In our previous work, we introduced a double-sided technique that utilizes but not reject the host interference. Due to its nice property of utilizing but not rejecting the host...
Jidong Zhong, Shangteng Huang
ICPR
2010
IEEE
13 years 6 months ago
Automatic Music Genre Classification Using Bass Lines
A bass line is an instrumental melody that encapsulates both rhythmic, melodic, and harmonic features and arguably contains sufficient information for accurate genre classificatio...
Umut Simsekli
INFOCOM
2008
IEEE
14 years 3 months ago
Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks
—We develop opportunistic scheduling policies for cognitive radio networks that maximize the throughput utility of the secondary (unlicensed) users subject to maximum collision c...
Rahul Urgaonkar, Michael J. Neely
WSCG
2004
245views more  WSCG 2004»
13 years 10 months ago
Pel-Recursive Motion Estimation Using the Expectation-Maximization Technique and Spatial Adaptation
Pel-recursive motion estimation is a well-established approach. However, in the presence of noise, it becomes an ill-posed problem that requires regularization. In this paper, mot...
Vania V. Estrela, Luís A. Rivera, Marcos H....
ALGORITHMICA
2008
110views more  ALGORITHMICA 2008»
13 years 9 months ago
Bandwidth-Constrained Allocation in Grid Computing
Grid computing systems pool together the resources of many workstations to create a virtual computing reservoir. Users can "draw" resources using a pay-as-you-go model, c...
Anshul Kothari, Subhash Suri, Yunhong Zhou