Sciweavers

15351 search results - page 2699 / 3071
» The information bottleneck method
Sort
View
IJISTA
2006
113views more  IJISTA 2006»
15 years 4 months ago
Extraction of mid-level semantics from gesture videos using a Bayesian network
In this paper a method for extraction of mid-level semantics from sign language videos is proposed, by employing high level domain knowledge. The semantics concern labeling of the ...
Dimitrios I. Kosmopoulos, Ilias Maglogiannis
COMSUR
2007
101views more  COMSUR 2007»
15 years 4 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
IJON
2006
131views more  IJON 2006»
15 years 4 months ago
Optimizing blind source separation with guided genetic algorithms
This paper proposes a novel method for blindly separating unobservable independent component (IC) signals based on the use of a genetic algorithm. It is intended for its applicati...
J. M. Górriz, Carlos García Puntonet...
CORR
2007
Springer
113views Education» more  CORR 2007»
15 years 4 months ago
Network Coding over a Noisy Relay : a Belief Propagation Approach
Abstract— In recent years, network coding has been investigated as a method to obtain improvements in wireless networks. A typical assumption of previous work is that relay nodes...
Sichao Yang, Ralf Koetter
IJSYSC
2006
92views more  IJSYSC 2006»
15 years 4 months ago
Adaptive control of distributed collector solar fields
: Distributed collector solar fields are spatially distributed engineering systems which aim at collecting and storing energy from solar radiation. They are formed by mirrors which...
J. M. Lemos
« Prev « First page 2699 / 3071 Last » Next »