Sciweavers

CVPR
2012
IEEE
12 years 3 months ago
Discriminative virtual views for cross-view action recognition
We propose an approach for cross-view action recognition by way of ‘virtual views’ that connect the action descriptors extracted from one (source) view to those extracted from...
Ruonan Li, Todd Zickler
INTERSPEECH
2010
13 years 7 months ago
Revisiting VTLN using linear transformation on conventional MFCC
In this paper, we revisit the linear transformation for VTLN on conventional MFCC proposed by Sanand et al. in [1], using the idea of band-limited interpolation. The filter-bank i...
Doddipatla Rama Sanand, Ralf Schlüter, Herman...
NN
2000
Springer
177views Neural Networks» more  NN 2000»
14 years 10 days ago
Independent component analysis: algorithms and applications
A fundamental problem in neural network research, as well as in many other disciplines, is finding a suitable representation of multivariate data, i.e. random vectors. For reasons...
Aapo Hyvärinen, Erkki Oja
NIPS
2008
14 years 2 months ago
Reducing statistical dependencies in natural signals using radial Gaussianization
We consider the problem of transforming a signal to a representation in which the components are statistically independent. When the signal is generated as a linear transformation...
Siwei Lyu, Eero P. Simoncelli
GLOBECOM
2007
IEEE
14 years 4 months ago
A Spectrally Efficient Transmission Scheme for Half-Duplex Decode-and-Forward Relaying
We propose a spectrally efficient transmission scheme for the half-duplex relay channel. In the proposed scheme, the relay combines N detected r-dimensional symbols and generates M...
Majid Nasiri Khormuji, Erik G. Larsson
INFOVIS
2003
IEEE
14 years 5 months ago
Visualization of Labeled Data Using Linear Transformations
We present a novel family of data-driven linear transformations, aimed at visualizing multivariate data in a low-dimensional space in a way that optimally preserves the structure ...
Yehuda Koren, Liran Carmel
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 7 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
ICIP
2004
IEEE
15 years 2 months ago
Shear-resize factorizations for fast multi-modal volume registration
Intensity-based methods work well for multi-modal image registration owing to their effectiveness and simplicity, but the computation for geometric transforms is a heavy load. To ...
Ying Chen, Pengwei Hao, Jian Yu