History
1
240

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 240 total

Sparse Legendre expansions via $\ell_1$-minimization. (English)
J. Approx. Theory 164, No. 5, 517-533 (2012).
1
Lower bounds for the error decay incurred by coarse quantization schemes. (English)
Appl. Comput. Harmon. Anal. 32, No. 1, 131-138 (2012).
2
Quantifier elimination in the theory of $L_p(L_q)$-Banach lattices. (English)
J. Log. Anal. 3, Article 11, 29 p., electronic only (2011).
3
Low-rank matrix recovery via iteratively reweighted least squares minimization. (English)
SIAM J. Optim. 21, No. 4, 1614-1640 (2011).
4
New and improved Johnson-Lindenstrauss embeddings via the restricted isometry property. (English)
SIAM J. Math. Anal. 43, No. 3, 1269-1281 (2011).
5
Trust in human-computer interactions as measured by frustration, surprise, and workload. (English)
Schmorrow, Dylan D. (ed.) et al., Foundations of augmented cognition. Directing the future of adaptive systems. 6th international conference, FAC 2011, held as Part of HCI international 2011, Orlando, FL, USA, July 9‒14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21851-4/pbk). Lecture Notes in Computer Science 6780. Lecture Notes in Artificial Intelligence, 507-516 (2011).
6
Increasing energy efficiency in sensor networks: blue noise sampling and non-convex matrix completion. (English)
Int. J. Sens. Netw. 9, No. 3-4, 158-169 (2011).
7
Some empirical advances in matrix completion. (English)
Signal Process. 91, No. 5, 1334-1338 (2011).
8
Computing the confidence levels for a root-mean-square test of goodness-of-fit. (English)
Appl. Math. Comput. 217, No. 22, 9072-9084 (2011).
9
Security analysis and complexity comparison of some recent lightweight RFID protocols. (English)
Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. 4th international conference, CISIS 2011, held at IWANN 2011, Torremolinos-Málaga, Spain, June 8‒10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21322-9/pbk). Lecture Notes in Computer Science 6694, 92-99 (2011).
10
New and improved Johnson-lindenstrauss embeddings via the restricted isometry property (English)
SIAM J. Math. Analysis 43, No. 3, 1269-1281 (2011).
11
Robust image watermarking based on multiscale gradient direction quantization (English)
IEEE Transactions on Information Forensics and Security 6, No. 4, 1200-1213 (2011).
12
Probabilistic analysis of blocking attack in RFID systems (English)
IEEE Transactions on Information Forensics and Security 6, No. 3-1, 803-817 (2011).
13
A robust and fast video copy detection system using content-based fingerprinting (English)
IEEE Transactions on Information Forensics and Security 6, No. 1, 213-226 (2011).
14
A new scheme for robust gradient vector estimation in color images (English)
IEEE Transactions on Image Processing 20, No. 8, 2211-2220 (2011).
15
Optimizing a tone curve for backward-compatible high dynamic range image and video compression (English)
IEEE Transactions on Image Processing 20, No. 6, 1558-1571 (2011).
16
Computing the confidence levels for a root-mean-square test of goodness-of-fit (English)
Applied Mathematics and Computation 217, No. 22, 9072-9084 (2011).
17
Probabilistic analysis and correction of Chen’s tag estimate method (English)
IEEE T. Automation Science and Engineering 8, No. 3, 659-663 (2011).
18
A new data hiding method using angle quantization index modulation in gradient domain (English)
ICASSP, 2440-2443 (2011).
19
Compressed sensing based MR image reconstruction from multiple partial K-space scans (English)
SiPS, 340-343 (2011).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 240 total