Sciweavers

457 search results - page 58 / 92
» A relative trust-region algorithm for independent component ...
Sort
View
DRM
2004
Springer
15 years 3 months ago
Tamper detection and localization for categorical data using fragile watermarks
Today, database relations are widely used and distributed over the Internet. Since these data can be easily tampered with, it is critical to ensure the integrity of these data. In...
Yingjiu Li, Huiping Guo, Sushil Jajodia
BMCBI
2010
240views more  BMCBI 2010»
14 years 9 months ago
TAM: A method for enrichment and depletion analysis of a microRNA category in a list of microRNAs
Background: MicroRNAs (miRNAs) are a class of important gene regulators. The number of identified miRNAs has been increasing dramatically in recent years. An emerging major challe...
Ming Lu, Bing Shi, Juan Wang, Qun Cao, Qinghua Cui
MOBIHOC
2010
ACM
14 years 7 months ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...
ICASSP
2009
IEEE
15 years 4 months ago
A multistage approach for blind separation of convolutive speech mixtures
In this paper, we propose a novel algorithm for the separation of convolutive speech mixtures using two-microphone recordings, based on the combination of independent component an...
Tariqullah Jan, Wenwu Wang, DeLiang Wang
IJCNN
2000
IEEE
15 years 2 months ago
Regression Analysis for Rival Penalized Competitive Learning Binary Tree
The main aim of this paper is to develop a suitable regression analysis model for describing the relationship between the index efficiency and the parameters of the Rival Penaliz...
Xuequn Li, Irwin King