Results 1 - 10
of
2,149
Mean shift: A robust approach toward feature space analysis
- In PAMI
, 2002
"... A general nonparametric technique is proposed for the analysis of a complex multimodal feature space and to delineate arbitrarily shaped clusters in it. The basic computational module of the technique is an old pattern recognition procedure, the mean shift. We prove for discrete data the convergence ..."
Abstract
-
Cited by 2395 (37 self)
- Add to MetaCart
-estimators of location is also established. Algorithms for two low-level vision tasks, discontinuity preserving smoothing and image segmentation are described as applications. In these algorithms the only user set parameter is the resolution of the analysis, and either gray level or color images are accepted as input
Dct-based motion estimation
- IEEE Trans. Image Processing
, 1998
"... Abstract—We propose novel discrete cosine transform (DCT) pseudophase techniques to estimate shift/delay between two onedimensional (1-D) signals directly from their DCT coefficients by computing the pseudophase shift hidden in DCT and then employing the sinusoidal orthogonal principles, applicable ..."
Abstract
-
Cited by 16 (6 self)
- Add to MetaCart
to signal delay estimation remote sensing. Under the two-dimensional (2-D) translational motion model, we further extend the pseudophase techniques to the DCT-based motion estimation (DXT-ME) algorithm for 2-D signals/images. The DXT-ME algorithm has certain advantages over the commonly used full search
Consensus and cooperation in networked multi-agent systems
- Proceedings of the IEEE
, 2007
"... Summary. This paper provides a theoretical framework for analysis of consensus algorithms for multi-agent networked systems with an emphasis on the role of directed information flow, robustness to changes in network topology due to link/node failures, time-delays, and performance guarantees. An ove ..."
Abstract
-
Cited by 807 (4 self)
- Add to MetaCart
in networked dynamic systems and diverse applications including synchronization of coupled oscillators, flocking, formation control, fast consensus in small-world networks, Markov processes and gossip-based algorithms, load balancing in networks, rendezvous in space, distributed sensor fusion in sensor
Iterative hard thresholding for compressed sensing
- Appl. Comp. Harm. Anal
"... Compressed sensing is a technique to sample compressible signals below the Nyquist rate, whilst still allowing near optimal reconstruction of the signal. In this paper we present a theoretical analysis of the iterative hard thresholding algorithm when applied to the compressed sensing recovery probl ..."
Abstract
-
Cited by 329 (18 self)
- Add to MetaCart
Compressed sensing is a technique to sample compressible signals below the Nyquist rate, whilst still allowing near optimal reconstruction of the signal. In this paper we present a theoretical analysis of the iterative hard thresholding algorithm when applied to the compressed sensing recovery
Asynchronous DCT-Based Data-Hiding Robust to Cropping
"... In this paper, we present a DCT-based data-hiding method robust to cropping. As it works in the DCT-domain, it is also robust to JPEG compression. A cropping operation on a JPEG image leads to the ap-plication of an additionnal compression. So, we achieve ro-bustness to several JPEG compressions by ..."
Abstract
- Add to MetaCart
In this paper, we present a DCT-based data-hiding method robust to cropping. As it works in the DCT-domain, it is also robust to JPEG compression. A cropping operation on a JPEG image leads to the ap-plication of an additionnal compression. So, we achieve ro-bustness to several JPEG compressions
Application of Medical Image Data Characteristics for constructing DCT-based compression algorithm.
- Supplement I, part I
, 1996
"... : We present the methods of improving the efficiency of Block DCT-based compression algorithm in the application to medical images archiving. The decrese of bit rate: for CR images up to 6%, for scintigraphy images up to 35%, for USG images up to 7% was achieved (in comparison to JPEG algorithm). Al ..."
Abstract
- Add to MetaCart
: We present the methods of improving the efficiency of Block DCT-based compression algorithm in the application to medical images archiving. The decrese of bit rate: for CR images up to 6%, for scintigraphy images up to 35%, for USG images up to 7% was achieved (in comparison to JPEG algorithm
Dct-Based Shape-Adaptive Transform For Region-Oriented Image Compression And Manipulation
"... . In the paper a new DCT-based shape-adaptive transform algorithm is presented. The transform is derived from the DCT algorithm flowgraph by substitution of operations in such a way that region and background samples are not mixed together. The computational complexity of the algorithm is of the sam ..."
Abstract
- Add to MetaCart
. In the paper a new DCT-based shape-adaptive transform algorithm is presented. The transform is derived from the DCT algorithm flowgraph by substitution of operations in such a way that region and background samples are not mixed together. The computational complexity of the algorithm
An Efficient and Scalable 2D DCT-Based Feature Coding Scheme for Remote Speech Recognition
, 2001
"... A 2D DCT-based approach to compressing acoustic features for remote speech recognition applications is presented. The coding scheme involves computing a 2D DCT on blocks of feature vectors followed by uniform scalar quantization, run-length and Huffman coding. Digit recognition experiments were ..."
Abstract
-
Cited by 13 (2 self)
- Add to MetaCart
A 2D DCT-based approach to compressing acoustic features for remote speech recognition applications is presented. The coding scheme involves computing a 2D DCT on blocks of feature vectors followed by uniform scalar quantization, run-length and Huffman coding. Digit recognition experiments were
A line in the sand: a wireless sensor network for target detection, classification, and tracking
- COMPUTER NETWORKS
, 2004
"... Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the intrusion detection problem and the related problems of classifying and tracking targets. Our approach is based on a de ..."
Abstract
-
Cited by 272 (41 self)
- Add to MetaCart
define the target, system, environment, and fault models. Based on the performance requirements of the scenario and the sensing, communication, energy, and computation ability of the sensor network, we explore the design space of sensors, signal processing algorithms, communications, networking
Real time compression of triangle mesh connectivity
- SIGGRAPH 98 Conference Proceedings, Annual Conference Series
, 1998
"... In this paper we introduce a new compressed representation for the connectivity of a triangle mesh. We present local compression and decompression algorithms which are fast enough for real time applications. The achieved space compression rates keep pace with the best rates reported for any known gl ..."
Abstract
-
Cited by 198 (11 self)
- Add to MetaCart
In this paper we introduce a new compressed representation for the connectivity of a triangle mesh. We present local compression and decompression algorithms which are fast enough for real time applications. The achieved space compression rates keep pace with the best rates reported for any known
Results 1 - 10
of
2,149