Special Notice
IEEE Xplore is transitioning to HTTPS on 9 April 2018. Customer access via EZproxy will require version 6 or higher with TLS 1.1 or 1.2 enabled.
Review our EZproxy Upgrade Checklist to ensure uninterrupted access.

IEEE Signal Processing Letters

Filter Results

Displaying Results 1 - 25 of 27
• [Front cover]

Publication Year: 2011, Page(s): C1
| PDF (222 KB)
• IEEE Signal Processing Letters publication information

Publication Year: 2011, Page(s): C2
| PDF (37 KB)

Publication Year: 2011, Page(s):1 - 2
| PDF (46 KB)
• Annealed SMC Samplers for Nonparametric Bayesian Mixture Models

Publication Year: 2011, Page(s):3 - 6
Cited by:  Papers (11)
| | PDF (146 KB) | HTML

We develop a novel online algorithm for posterior inference in Dirichlet Process Mixtures (DPM). Our method is based on the Sequential Monte Carlo (SMC) samplers framework that generalizes sequential importance sampling approaches. Unlike the existing methods, the framework enables us to retrospectively update long trajectories in the light of recent observations and this leads to sophisticated cl... View full abstract»

• Mean Weight Behavior of the NLMS Algorithm for Correlated Gaussian Inputs

Publication Year: 2011, Page(s):7 - 10
Cited by:  Papers (6)
| | PDF (228 KB) | HTML

This letter presents a novel approach for evaluating the mean behavior of the well known normalized least mean squares (NLMS) adaptive algorithm for a circularly correlated Gaussian input. The mean analysis of the NLMS algorithm requires the calculation of some normalized moments of the input. This is done by first expressing these moments in terms of ratios of quadratic forms of spherically symme... View full abstract»

• Computationally Efficient Approaches to Aeroacoustic Source Power Estimation

Publication Year: 2011, Page(s):11 - 14
Cited by:  Papers (2)
| | PDF (261 KB) | HTML

Two computationally efficient approaches are proposed for aeroacoustic source power estimation, under the assumption of a single dominant source contaminated by uncorrelated noise. The proposed methods are evaluated using both simulated and measured data. The numerical examples show that the proposed algorithms yield good power estimates even under low signal-to-noise ratio (SNR) conditions, and t... View full abstract»

• Channel Access Allocation for Scalable Video Transmission Over Contention-Based Wireless Networks

Publication Year: 2011, Page(s):15 - 18
| | PDF (200 KB) | HTML

Contention-based wireless networks make use of random access delay in the medium access control (MAC) layer to share the channel efficiently among users. This channel access scheme poses challenges to video traffic which is delay-sensitive. When channel access is limited, how to optimally allocate channel access and judiciously drop video packets remains an open issue. In this paper, we investigat... View full abstract»

• Binocular Just-Noticeable-Difference Model for Stereoscopic Images

Publication Year: 2011, Page(s):19 - 22
Cited by:  Papers (51)
| | PDF (387 KB) | HTML

Conventional 2-D Just-Noticeable-Difference (JND) models measure the perceptible distortion of visual signal based on monocular vision properties by presenting a single image for both eyes. However, they are not applicable for stereoscopic displays in which a pair of stereoscopic images is presented to a viewer's left and right eyes, respectively. Some unique binocular vision properties, e.g., bin... View full abstract»

• Shadow Compensation Using Fourier Analysis With Application to Face Recognition

Publication Year: 2011, Page(s):23 - 26
Cited by:  Papers (8)
| | PDF (656 KB) | HTML

Shadows that occur on face images due to illumination variation can change the appearance of a face and degrade face recognition performance. In this paper, we propose a new shadow compensation method based on the Fourier analysis for handling illumination variation. The face image deteriorated by shadow is restored by using the auxiliary magnitude, which compensates for the magnitude of the Fouri... View full abstract»

• Stepwise Optimal Subspace Pursuit for Improving Sparse Recovery

Publication Year: 2011, Page(s):27 - 30
Cited by:  Papers (14)
| | PDF (260 KB) | HTML

We propose a new iterative algorithm to reconstruct an unknown sparse signal x from a set of projected measurements y = Φx . Unlike existing methods, which rely crucially on the near orthogonality of the sampling matrix Φ , our approach makes stepwise optimal updates even when the columns of Φ are not orthogonal. We invoke a block-wise matrix inversion formula to obtain a clos... View full abstract»

• A Testbed and Methodology for Comparing Live Video Frame Rate Control Methods

Publication Year: 2011, Page(s):31 - 34
| | PDF (276 KB) | HTML

Most existing methods for video frame rate control were developed for prerecorded video. With the proliferation of mobile audiovisual communication devices, it is becoming important to develop frame rate control methods for live (i.e., not prerecorded) video as well. In this letter, we present a testbed and the corresponding methodology suitable for comparing such methods. We illustrate the method... View full abstract»

• Wideband Spectrum Sensing for Cognitive Radios With Correlated Subband Occupancy

Publication Year: 2011, Page(s):35 - 38
Cited by:  Papers (24)
| | PDF (284 KB) | HTML

In this letter, we consider wideband spectrum sensing in the presence of correlation between the occupancies of frequency subbands. We begin by formulating the maximum a posteriori (MAP) estimator of channel occupancy based on measurements from multiple frequency subbands. Since the MAP estimator's complexity grows exponentially with the number of subbands, we propose an alternative structure, in ... View full abstract»

• Security Analysis on Spatial $pm$1 Steganography for JPEG Decompressed Images

Publication Year: 2011, Page(s):39 - 42
Cited by:  Papers (11)
| | PDF (573 KB) | HTML

Although many existing steganalysis works have shown that the spatial ±1 steganography on JPEG pre-compressed images is relatively easier to be detected compared with that on the never-compressed images, most experimental results seem not very convincing since these methods usually assume that the quantization table of the JPEG stegos previously used is known before detection and/or the len... View full abstract»

• Kronecker Product Based Second Order Approximation of Mean Value and Covariance Matrix in Nonlinear Transformations

Publication Year: 2011, Page(s):43 - 46
Cited by:  Papers (1)
| | PDF (138 KB) | HTML

This paper derives new formulae for the approximations of the mean value and the covariance matrix of a random vector which is derived as a nonlinear transformation of another random vector. Towards this purpose, it is first proposed to formulate the Taylor series expansion by using Kronecker product operators along with partial derivatives block matrices. This formulation facilitates the mathemat... View full abstract»

• A Quaternion Gradient Operator and Its Applications

Publication Year: 2011, Page(s):47 - 50
Cited by:  Papers (65)
| | PDF (160 KB) | HTML

Real functions of quaternion variables are typical cost functions in quaternion valued statistical signal processing, however, standard differentiability conditions in the quaternion domain do not permit direct calculation of their gradients. To this end, based on the isomorphism with real vectors and the use of quaternion involutions, we introduce the HR calculus as a convenient way to calculate ... View full abstract»

• Visual Tracking Using High-Order Particle Filtering

Publication Year: 2011, Page(s):51 - 54
Cited by:  Papers (19)
| | PDF (251 KB) | HTML

In this letter, we extend the first-order Markov chain model commonly used in visual tracking and present a novel framework of visual tracking using high-order Monte Carlo Markov chain. By using graphical models to obtain conditional independence properties, we derive a general expression for the posterior density function of an m th-order hidden Markov model. We subsequently use Sequential... View full abstract»

• Nearest Feature Space Analysis for Classification

Publication Year: 2011, Page(s):55 - 58
Cited by:  Papers (26)
| | PDF (149 KB) | HTML

We propose in this letter two new subspace learning methods, called nearest feature space analysis (NFSA) and discriminant nearest feature space analysis (DNFSA), for pattern classification. While many subspace learning algorithms have been proposed in recent years, most of them apply the conventional nearest neighbor (NN) metric to derive the subspace and may not effectively characterize the geom... View full abstract»

• A Nuclear Norm Heuristic Approach to Fractionally Spaced Blind Channel Equalization

Publication Year: 2011, Page(s):59 - 62
Cited by:  Papers (8)
| | PDF (226 KB) | HTML

This letter proposes an algorithm for the blind fractionally spaced equalization (FSE). We show that the rank minimization approach leads to the reduction of degrees of freedom in the blind FSE problem and improves the quality of equalization. By introducing the nuclear norm heuristic, the design problem of blind channel equalization is formulated as the nuclear norm minimization problem. We also ... View full abstract»

• Existence of Binary $Z$-Complementary Pairs

Publication Year: 2011, Page(s):63 - 66
Cited by:  Papers (2)
| | PDF (112 KB) | HTML

The conventional binary complementary pairs exist only for very limited lengths, while binary Z -complementary pairs exist for many more lengths. In this letter, an upper bound on zero correlation zone (ZCZ) width of binary Z-complementary pairs of odd length is established. The existence conjecture of binary Z-complementary pairs with ZCZ widths 2, 3, 4, 5 and 6 is completely... View full abstract»

• Performance Analysis of Relay Selection With Feedback Delay and Channel Estimation Errors

Publication Year: 2011, Page(s):67 - 70
Cited by:  Papers (33)
| | PDF (214 KB) | HTML

In this letter, we investigate the effect of feedback delay and channel estimation errors in a decode-and-forward (DF) cooperative network with relay selection. In particular, we consider a multirelay cooperative scenario, where the best relay is selected from a subset of relays that are able to decode the source information correctly. In the selection scenario, the destination terminal estimates ... View full abstract»

• A Modified SRP-PHAT Functional for Robust Real-Time Sound Source Localization With Scalable Spatial Sampling

Publication Year: 2011, Page(s):71 - 74
Cited by:  Papers (49)
| | PDF (393 KB) | HTML

The Steered Response Power - Phase Transform (SRP-PHAT) algorithm has been shown to be one of the most robust sound source localization approaches operating in noisy and reverberant environments. However, its practical implementation is usually based on a costly fine grid-search procedure, making the computational cost of the method a real issue. In this letter, we introduce an effective strategy ... View full abstract»

• Inpainting by Joint Optimization of Linear Combinations of Exemplars

Publication Year: 2011, Page(s):75 - 78
Cited by:  Papers (14)
| | PDF (470 KB) | HTML Media

Exemplar-based methods, in which actual image blocks are used to fill in missing content, have achieved state of the art performance in image inpainting. The majority of these adopt a progressive approach, filling in the missing region inwards from the boundary. The final result is highly dependent on fill order, and while significant progress has been made on the choice of this order, the greedy ... View full abstract»

• Blank page

Publication Year: 2011, Page(s):79 - 80
| PDF (6 KB)
• IEEE Signal Processing Letters Information for authors

Publication Year: 2011, Page(s):81 - 82
| PDF (58 KB)

Publication Year: 2011, Page(s):83 - 84
| PDF (1065 KB)

Aims & Scope

The IEEE Signal Processing Letters is a monthly, archival publication designed to provide rapid dissemination of original, cutting-edge ideas and timely, significant contributions in signal, image, speech, language and audio processing.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
James E. Fowler
Dept Electrical & Computer Engineering
Associate Director
Distributed Analytics and Security Institute
Mississippi State University
Mississippi State, MS 39762 USA
fowler@ece.msstate.edu