Sciweavers

5592 search results - page 27 / 1119
» On Random Betweenness Constraints
Sort
View
TIT
2002
78views more  TIT 2002»
13 years 9 months ago
Tradeoffs between the excess-code-length exponent and the excess-distortion exponent in lossy source coding
Lossy compression of a discrete memoryless source (DMS) with respect to a single-letter distortion measure is considered. We study the best attainable tradeoff between the exponent...
Tsachy Weissman, Neri Merhav
ICIP
2001
IEEE
14 years 11 months ago
A new video-object watermarking scheme robust to object manipulation
This paper presents a watermarking scheme for image or video objects. The watermarking of video objects implies different constraints from raw watermarking methods. The mark has t...
Patrick Bas, Benoit M. Macq
EMMCVPR
2011
Springer
12 years 9 months ago
Multiple-Instance Learning with Structured Bag Models
Traditional approaches to Multiple-Instance Learning (MIL) operate under the assumption that the instances of a bag are generated independently, and therefore typically learn an in...
Jonathan Warrell, Philip H. S. Torr
WSC
2001
13 years 11 months ago
Chessboard distributions
We review chessboard distributions for modeling partially specified finite-dimensional random vectors. Chessboard distributions can match a given set of marginals, a given covaria...
Soumyadip Ghosh, Shane G. Henderson
MOBIHOC
2002
ACM
14 years 9 months ago
Characterizing the interaction between routing and MAC protocols in ad-hoc networks
We empirically study the effect of mobility and interaction between various input parameters on the performance of protocols designed for wireless ad-hoc networks. An important ob...
Christopher L. Barrett, Achla Marathe, Madhav V. M...