Sciweavers

245 search results - page 43 / 49
» Second Order Approximations for Probability Models
Sort
View
SECON
2008
IEEE
14 years 1 months ago
Optimal Buffer Management Policies for Delay Tolerant Networks
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
STOC
1997
ACM
125views Algorithms» more  STOC 1997»
13 years 11 months ago
An Interruptible Algorithm for Perfect Sampling via Markov Chains
For a large class of examples arising in statistical physics known as attractive spin systems (e.g., the Ising model), one seeks to sample from a probability distribution π on an...
James Allen Fill
CMA
2010
134views more  CMA 2010»
13 years 4 months ago
Particle tracking for fractional diffusion with two time scales
Abstract. Previous work [51] showed how to solve time-fractional diffusion equations by particle tracking. This paper extends the method to the case where the order of the fraction...
Mark M. Meerschaert, Yong Zhang, Boris Baeumer
ICCV
2009
IEEE
15 years 10 days ago
Boundary Ownership by Lifting to 2.5D
This paper addresses the “boundary ownership” problem, also known as the figure/ground assignment problem. Estimating boundary ownerships is a key step in perceptual organiz...
Ido Leichter and Michael Lindenbaum
ICIP
2003
IEEE
14 years 9 months ago
Spline-based boundary loss concealment
Object-based video coding requires the transmission of the object shape. This shape is sent as a binary a-plane. In lossy packetbased networks, such as the Internet, this informat...
Guido M. Schuster, Xiaohuan Li, Aggelos K. Katsagg...