Sciweavers

2085 search results - page 401 / 417
» Model Selection Criteria in Computer Vision: Are They Differ...
Sort
View
TKDE
2010
224views more  TKDE 2010»
13 years 3 months ago
Non-Negative Matrix Factorization for Semisupervised Heterogeneous Data Coclustering
Coclustering heterogeneous data has attracted extensive attention recently due to its high impact on various important applications, such us text mining, image retrieval, and bioin...
Yanhua Chen, Lijun Wang, Ming Dong
MOBIHOC
2009
ACM
14 years 9 months ago
Multicasting in delay tolerant networks: a social network perspective
Node mobility and end-to-end disconnections in Delay Tolerant Networks (DTNs) greatly impair the effectiveness of data dissemination. Although social-based approaches can be used ...
Wei Gao, Qinghua Li, Bo Zhao, Guohong Cao
ISBI
2007
IEEE
14 years 2 months ago
A Novel Tag Removal Technique for Tagged Cardiac Mri and Its Applications
In this paper we present a novel tag removal method for tagged cardiac MR images. This method is based on a 2D bandstop filtering technique, which selectively attenuates the tag ...
Zhen Qian, Rui Huang, Dimitris N. Metaxas, Leon Ax...
SG
2007
Springer
14 years 2 months ago
Lighting-by-Example with Wavelets
Automatic lighting design aims to provide users with semi-automated approaches, and easy-to-use tools, to configure lighting for 3D scenes. We present LIGHTOPEX the first fully aut...
Hai Nam Ha, Patrick Olivier
WMASH
2003
ACM
14 years 1 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...