In this paper, we present a patch-based variational Bayesian framework of image processing using the language of factor graphs (FGs). The variable and factor nodes of FGs represen...
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
A new method for the simplification and the visualization of vector fields is presented based on the notion of Centroidal Voronoi tessellations (CVT's). A CVT is a special Vo...
Optical Sections of biological samples obtained from a fluorescence Confocal Laser Scanning Microscopes (CLSM) are often degraded by out-of-focus blur and photon counting noise. S...
Praveen Pankajakshan, Bo Zhang, Laure Blanc-F&eacu...
Research has demonstrated how successful coordination can lead to greater organizational performance. In information technology (IT) projectbased environments, coordinating the kn...