Sciweavers

1898 search results - page 242 / 380
» Weak Keys for IDEA
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
Image inpainting with a wavelet domain Hidden Markov tree model
We present a novel technique for image inpainting, the problem of filling-in missing image parts. Image inpainting is ill-posed and we adopt a probabilistic model-based approach ...
George Papandreou, Petros Maragos, Anil Kokaram
ICASSP
2008
IEEE
14 years 4 months ago
Audio authentication based on distributed source coding
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
David P. Varodayan, Yao-Chung Lin, Bernd Girod
ICDM
2008
IEEE
176views Data Mining» more  ICDM 2008»
14 years 4 months ago
Inlier-Based Outlier Detection via Direct Density Ratio Estimation
We propose a new statistical approach to the problem of inlier-based outlier detection, i.e., finding outliers in the test set based on the training set consisting only of inlier...
Shohei Hido, Yuta Tsuboi, Hisashi Kashima, Masashi...
IPPS
2008
IEEE
14 years 4 months ago
Optimal spot-checking to minimize the computation time in volunteer computing
This paper proposes an optimization technique for spotchecking to minimize the computation time of volunteer computing (VC) systems with malicious participants who return erroneou...
Kan Watanabe, Masaru Fukushi, Susumu Horiguchi
IPPS
2008
IEEE
14 years 4 months ago
Mobility control schemes with quick convergence in wireless sensor networks
In the near future, wireless sensor networks (WSN) performing sensing and communication tasks will be widely deployed as technology rapidly advances. Communication is one of the e...
Xiao Chen, Zhen Jiang, Jie Wu