loading
Extending α-expansion to a larger set of regularization functions
2015 Edition, September 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Many problems of image processing lead to the minimization of an energy, which is a function of one or several given images, with respect to a binary or multi-label image. When this energy is made of unary data terms and of...

Generalized Kasami Sequences: The Large Set
2007 Edition, Volume 53, July 1, 2007 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

In this correspondence, new binary sequence families Fk of period 2n-1 are constructed for even n and any k with gcd(k,n)=2 if n/2 is odd or gcd(k,n)=1 if n/2 is even. The distribution of their correlation values is completely determined. These families have maximum correlation 2n/2+1...

Iterative Image Restoration using a Non-Local Regularization Function and a Local Regularization Operator
2006 Edition, Volume 3, January 1, 2006 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The regularization of the least-squares criterion has been established as an effective approach of solving ill-posed image restoration problems. Unfortunately, a proper global regularization parameter is very difficult to be determined, and edges are...

Statistical analysis of large sets of models
2016 Edition, September 1, 2016 - Association for Computing Machinery (ACM)

Many applications in Model-Driven Engineering involve processing multiple models, e.g. for comparing and merging of model variants into a common domain model. Despite many sophisticated techniques for model comparison, little attention has been given to the initial data...

Hybridization and ring optimization for larger sets of embeddable biomarkers
2017 Edition, August 1, 2017 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Embeddable biomarkers are short strands of DNA that can be incorporated into genetic constructs to enable later identification. They are drawn from error correcting codes on the DNA alphabet relative to the Levenshtein metric. This study uses three types of evolutionary...

Multi-agent push behaviors for large sets of passive objects
2016 Edition, October 1, 2016 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

We present a reactive multi-agent push system for a large set of objects. The behavior for the pushing agents consists of: 1) selecting and updating an object set to push, 2) reaching positions near the objects to start influencing, 3)...

Regularization function for video super-resolution using auxiliary high resolution still images
2012 Edition, November 1, 2012 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

In this paper video super-resolution using sequences generated by dual-mode cameras is studied. Dual-mode cameras are capable to shoot high-resolution still images at a low rate while taking low-resolution video from the scene. An algorithm for video super-resolution is proposed which...

Fast regularized kernel function approximation
2008 Edition, November 1, 2008 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

We propose a simple formulation for regularized kernel function approximation. The regression function is obtained by minimizing an unconstrained quadratic function. Further reduced kernel technique is also employed in its formulation which enables it to...

Correction toLarge Sets of Orthogonal Sequences Suitable for Applications in CDMA Systems”
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Presents corrections to the paper, "Large sets of orthogonal sequences suitable for applications in CDMA systems," (Zhang, W.-G.), IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 3757- 3767, Jun. 2016.

Probabilistic km-anonymity efficient anonymization of large set-valued datasets
2015 Edition, October 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Set-valued dataset contains different types of items/values per individual, for example, visited locations, purchased goods, watched movies, or search queries. As it is relatively easy to re-identify individuals in such datasets, their release poses significant privacy threats....

Advertisement