Sciweavers

3389 search results - page 163 / 678
» Perspectives on system identification
Sort
View
TCSV
2008
150views more  TCSV 2008»
13 years 8 months ago
Robust Video Fingerprinting for Content-Based Video Identification
Video fingerprints are feature vectors that uniquely characterize one video clip from another. The goal of video fingerprinting is to identify a given video query in a database (DB...
Sunil Lee, Chang Dong Yoo
TSP
2008
69views more  TSP 2008»
13 years 8 months ago
Nonminimum Phase Identification Based on Higher Order Spectrum Slices
A new family of methods, named phase estimation using polyspectrum slices (PEP), for the reconstruction of the Fourier phase of a complex linear time invariant (LTI) system excited...
Amar Kachenoura, Laurent Albera, Jean-Jacques Bell...
URBAN
2008
83views more  URBAN 2008»
13 years 8 months ago
Automatic identification of urban settlement boundaries for multiple representation databases
Intuitive and meaningful interpretation of geographical phenomena requires their representation at multiple levels of detail. This is due to the scale dependent nature of their pr...
Omair Chaudhry, William A. Mackaness
CANDC
2004
ACM
13 years 8 months ago
Identification of related gene/protein names based on an HMM of name variations
Gene and protein names follow few, if any, true naming conventions and are subject to great variation in different occurrences of the same name. This gives rise to two important p...
Lana Yeganova, Lawrence H. Smith, W. John Wilbur
INFOCOM
2010
IEEE
13 years 6 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...