Sciweavers

SQJ
2016
62views more  SQJ 2016»
10 years 17 days ago
Assessing vulnerability exploitability risk using software properties
Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray
SPM
2016
49views more  SPM 2016»
10 years 17 days ago
Top Downloads in IEEE Xplore [Reader's Choice]
JOURNALS ABSTRACT APR MAR FEB JAN DEC NOV JAN 2006 A TUTORIAL ON PARTICLE FILTERS FOR This article reviews both optimal 28 34 31 15 21 32 21 ONLINE NONLINEAR/NON-GAUSSIAN and subop...
SPL
2016
59views more  SPL 2016»
10 years 17 days ago
Voice Activity Detection: Merging Source and Filter-based Information
—Voice Activity Detection (VAD) refers to the problem of distinguishing speech segments from background noise. Numerous approaches have been proposed for this purpose. Some are b...
Thomas Drugman, Yannis Stylianou, Yusuke Kida, Mas...
SPL
2016
51views more  SPL 2016»
10 years 17 days ago
Complex and Quaternionic Principal Component Pursuit and Its Application to Audio Separation
Abstract—Recently, the principal component pursuit has received increasing attention in signal processing research ranging from source separation to video surveillance. So far, a...
Tak-Shing Chan, Yi-Hsuan Yang
SPL
2016
48views more  SPL 2016»
10 years 17 days ago
ACE-An Effective Anti-forensic Contrast Enhancement Technique
—Detecting Contrast Enhancement (CE) in images and anti-forensic approaches against such detectors have gained much attention in multimedia forensics lately. Several contrast enh...
Hareesh Ravi, A. V. Subramanyam, Sabu Emmanuel