Sciweavers

5267 search results - page 987 / 1054
» Methods for Knowledge Based Controlling of Distributed Syste...
Sort
View
ICCV
2009
IEEE
16 years 7 months ago
Efficient Privacy Preserving Video Surveillance
Widespread use of surveillance cameras in offices and other business establishments, pose a significant threat to the privacy of the employees and visitors. The challenge of int...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...
ICIP
2003
IEEE
16 years 3 months ago
On the Rayleigh nature of Gabor filter outputs
Texture has been recognized as an important visual primitive in image analysis. A widely used texture descriptor, which is part of the MPEG-7 standard, is that computed using mult...
Sitaram Bhagavathy, Jelena Tesic, B. S. Manjunath
ISBI
2008
IEEE
16 years 3 months ago
Blind deconvolution for diffraction-limited fluorescence microscopy
Optical Sections of biological samples obtained from a fluorescence Confocal Laser Scanning Microscopes (CLSM) are often degraded by out-of-focus blur and photon counting noise. S...
Praveen Pankajakshan, Bo Zhang, Laure Blanc-F&eacu...
ARC
2009
Springer
188views Hardware» more  ARC 2009»
15 years 9 months ago
Word-Length Optimization and Error Analysis of a Multivariate Gaussian Random Number Generator
Abstract. Monte Carlo simulation is one of the most widely used techniques for computationally intensive simulations in mathematical analysis and modeling. A multivariate Gaussian ...
Chalermpol Saiprasert, Christos-Savvas Bouganis, G...
HT
2009
ACM
15 years 8 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer