Sciweavers

349 search results - page 45 / 70
» Symmetrically exploiting XML
Sort
View
GI
2010
Springer
13 years 8 months ago
Extended Object and Group Tracking: A Comparison of Random Matrices and Random Hypersurface Models
: Based on previous work of the authors, this paper provides a comparison of two different tracking methodologies for extended objects and group targets, where the true shape of th...
Marcus Baum, Michael Feldmann, Dietrich Fraenken, ...
TIT
2010
158views Education» more  TIT 2010»
13 years 4 months ago
Belief propagation, Dykstra's algorithm, and iterated information projections
Belief propagation is shown to be an instance of a hybrid between two projection algorithms in the convex programming literature: Dykstra's algorithm with cyclic Bregman proje...
John MacLaren Walsh, Phillip A. Regalia
ICASSP
2011
IEEE
13 years 1 months ago
Deterministic compressed-sensing matrices: Where Toeplitz meets Golay
Recently, the statistical restricted isometry property (STRIP) has been formulated to analyze the performance of deterministic sampling matrices for compressed sensing. In this pa...
Kezhi Li, Cong Ling, Lu Gan
ICASSP
2011
IEEE
13 years 1 months ago
A robust estimator and detector of circularity of complex signals
Recent research has revealed that circularity (or, propriety) of complex random signals can be exploited in developing optimal signal processors. In this paper, a robust estimator...
Esa Ollila, Visa Koivunen, H. Vincent Poor
ICASSP
2011
IEEE
13 years 1 months ago
Bayesian reinforcement learning for POMDP-based dialogue systems
Spoken dialogue systems are gaining popularity with improvements in speech recognition technologies. Dialogue systems can be modeled effectively using POMDPs, achieving improvemen...
ShaoWei Png, Joelle Pineau