Sciweavers

128 search results - page 23 / 26
» ce 2008
Sort
View
PAMI
2008
181views more  PAMI 2008»
13 years 7 months ago
Automatic Estimation and Removal of Noise from a Single Image
Image denoising algorithms often assume an additive white Gaussian noise (AWGN) process that is independent of the actual RGB values. Such approaches cannot effectively remove colo...
Ce Liu, Richard Szeliski, Sing Bing Kang, C. Lawre...
CN
2002
96views more  CN 2002»
13 years 7 months ago
A transparent deployment method of RSVP-aware applications on UNIX
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications ...
Yu-Ben Miao, Wen-Shyang Hwang, Ce-Kuen Shieh
TIP
1998
129views more  TIP 1998»
13 years 7 months ago
Minimax partial distortion competitive learning for optimal codebook design
— The design of the optimal codebook for a given codebook size and input source is a challenging puzzle that remains to be solved. The key problem in optimal codebook design is h...
Ce Zhu, Lai-Man Po
TNN
1998
146views more  TNN 1998»
13 years 7 months ago
An analytical framework for local feedforward networks
Interference in neural networks occurs when learning in one area of the input space causes unlearning in another area. Networks that are less susceptible to interference are refer...
S. Weaver, L. Baird, Marios M. Polycarpou
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 7 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang