Sciweavers

5410 search results - page 1049 / 1082
» When to Cross Over
Sort
View
TIP
1998
142views more  TIP 1998»
13 years 9 months ago
Inversion of large-support ill-posed linear operators using a piecewise Gaussian MRF
Abstract—We propose a method for the reconstruction of signals and images observed partially through a linear operator with a large support (e.g., a Fourier transform on a sparse...
Mila Nikolova, Jérôme Idier, Ali Moha...
SIGCSE
2002
ACM
134views Education» more  SIGCSE 2002»
13 years 9 months ago
Internationalization of the curriculum report of a project within computer science
In the Fall of 1999 the Center for Excellence in Undergraduate Teaching (CEUT) and the International Office at Virginia Tech provided a small grant to support the incorporation of...
John A. N. Lee
TASLP
2002
67views more  TASLP 2002»
13 years 9 months ago
Efficient tracking of the cross-correlation coefficient
In many (audio) processing algorithms, involving manipulation of discrete-time signals, the performance can vary strongly over the repertoire that is used. This may be the case whe...
Ronald M. Aarts, Roy Irwan, Augustus J. E. M. Jans...
TMI
2002
386views more  TMI 2002»
13 years 9 months ago
Tracking Leukocytes In Vivo with Shape and Size Constrained Active Contours
Inflammatory disease is initiated by leukocytes (white blood cells) rolling along the inner surface lining of small blood vessels called postcapillary venules. Studying the number ...
Nilanjan Ray, Scott T. Acton, Klaus Ley
TON
2002
75views more  TON 2002»
13 years 9 months ago
Optimal retrial and timeout strategies for accessing network resources
The notion of timeout (namely, the maximal time to wait before retrying an action) turns up in many networking contexts, such as packet transmission, connection establishment, etc....
Lavy Libman, Ariel Orda
« Prev « First page 1049 / 1082 Last » Next »