—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
— Non-negative matrix factorization (NMF), i.e. V ≈ WH where both V, W and H are non-negative has become a widely used blind source separation technique due to its part based r...
Based on scaling laws describing the statistical structure
of turbulent motion across scales, we propose a multiscale
and non-parametric regularizer for optic-flow estimation.
R...
Patrick H´eas, Etienne M´emin, Dominique Heitz, ...
We present various kinds of variational PDE based methods to interpolate missing sinogram data for tomographic image reconstruction. Using the observed sinogram data we inpaint th...
We propose a similarity measure based on a Spatial-color Mixture of Gaussians (SMOG) appearance model for particle filters. This improves on the popular similarity measure based o...
Hanzi Wang, David Suter, Konrad Schindler, Chunhua...