Sciweavers

509 search results - page 100 / 102
» icassp 2008
Sort
View
ICASSP
2009
IEEE
14 years 5 months ago
Denoising scheme for realistic digital photos from unknown sources
: © Denoising Scheme for Realistic Digital Photos from Unknown Sources Suk Hwan Lim, Ron Maurer, Pavel Kisilev HP Laboratories HPL-2008-167 No keywords available. This paper targe...
Suk Hwan Lim, Ron Maurer, Pavel Kisilev
ICASSP
2008
IEEE
14 years 5 months ago
Image processing by topological asymptotic analysis
The aim of this article is to recall the applications of the topological asymptotic expansion to many image processing problems. We briefly review the topological asymptotic analy...
Didier Auroux, Mohamed Masmoudi
ICASSP
2008
IEEE
14 years 5 months ago
Secure wireless communications: Secret keys through multipath
Secure wireless communications is a challenging problem due to the shared nature of the wireless medium. Most existing security protocols apply cryptographic techniques for bit sc...
Akbar M. Sayeed, Adrian Perrig
ICASSP
2008
IEEE
14 years 5 months ago
An information theoretic approach to processing management
In region surveillance applications, sensors oftentimes accumulate an overwhelmingly large amount of data, making it infeasible to process all of the collected data in real-time. ...
Christopher M. Kreucher, Kevin M. Carter
ICASSP
2008
IEEE
14 years 5 months ago
Joint tracking and video registration by factorial Hidden Markov models
Tracking moving objects from image sequences obtained by a moving camera is a difficult problem since there exists apparent motion of the static background. It becomes more dif...
Xue Mei, Fatih Murat Porikli