Sciweavers

ICIP
2000
IEEE
14 years 11 months ago
Universal Multi-Scale Matching Pursuits Algorithm with Reduced Blocking Effect
Murilo B. de Carvalho, Eduardo A. B. da Silva, Wei...
ICIP
2000
IEEE
14 years 11 months ago
Locally Adaptive Deblocking Filter for Low Bit Rate Video
Blocking artifacts are a major degradation affecting blockbased video compression. In this paper an adaptively based filter is proposed, whereby the type of filtering to be applie...
Billy Cahill, Conor Heneghan
ICIP
2000
IEEE
14 years 11 months ago
Estimating Decoding Times of MPEG-2 Video Streams
This paper is motivated through the advantages offered by employing real-time (priority-driven) scheduling (RTS) for efficiently implementing quality-of-service guarantees. For em...
Lars-Olof Burchard, Peter Altenbernd
ICIP
2000
IEEE
14 years 11 months ago
Multiframe Bayesian Tracking of Cluttered Targets with Random Motion
José M. F. Moura, Marcelo G. S. Bruno
ICIP
2000
IEEE
14 years 11 months ago
Clustered Component Analysis for FMRI Signal Estimation and Classification
In this paper, we introduce a method for estimating the statistically distinct neural responses in an sequence of functional magnetic resonance images (fMRI). The crux of our meth...
Charles A. Bouman, Sea Chen, Mark J. Lowe
ICIP
2000
IEEE
14 years 11 months ago
Terrain Feature Identification by Modeling Radar Image Statistics
In this paper we propose a new statistical model for SAR images. According to this model, the SAR image amplitude follows a product of Rayleigh and Bessel functions. We derive the...
Adrian G. Bors, Edwin R. Hancock, Richard C. Wilso...
ICIP
2000
IEEE
14 years 11 months ago
Towards an Optimal Television Display Format
The techniques for video format conversion recently have reached a maturity, where they no longer prohibit application in the consumer domain because of high price or clear pictur...
Erwin B. Bellers, Gerard de Haan
ICIP
2000
IEEE
14 years 11 months ago
Compression Tolerant Watermarking for Image Verification
Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a ne...
Harpal S. Bassali, Jatin Chhugani, Saurabh Agarwal...