Abstract. When a block is lost due to a transmission error in compressed bitstream, conventional temporal error concealment schemes try to conceal the lost block by recovering its ...
The designation “fault tolerant software” has been used for techniques ranging from roll-back and retry to N-version programming, from data mirroring to functional redundancy....
We propose a kernel-density based scheme that incorporates the object colors with their spatial relevance to track the object in a video sequence. The object is modeled by the col...
Star schema, which maintains one-to-many relationships between dimensions and a fact table, is widely accepted as the most viable data representation for dimensional analysis. Rea...
Il-Yeol Song, William Rowen, Carl Medsker, Edward ...
The function of eukaryotic protein is closely correlated with its subcellular location. The number of newly found protein sequences entering into data banks is rapidly increasing ...