Sciweavers

1134 search results - page 86 / 227
» Analyzing Mapping Extraction Approaches
Sort
View
149
Voted
IEEEARES
2010
IEEE
15 years 8 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
ISBI
2002
IEEE
16 years 4 months ago
A spatially robust ICA algorithm for multiple fMRI data sets
In this paper we derive an independent-component analysis (ICA) method for analyzing two or more data sets simultaneously. Our model extracts independent components common to all ...
Ana S. Lukic, Miles N. Wernick, Lars Kai Hansen, J...
111
Voted
ICMCS
2006
IEEE
231views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Performance of Optical Flow Techniques on Graphics Hardware
Since graphics cards have become programmable the recent years, numerous computationally intensive algorithms have been implemented on the now called General Purpose Graphics Proc...
Marko Durkovic, Michael Zwick, Florian Obermeier, ...
109
Voted
IWINAC
2005
Springer
15 years 9 months ago
Separation of Extracellular Spikes: When Wavelet Based Methods Outperform the Principle Component Analysis
spike separation is a basic prerequisite for analyzing of the cooperative neural behavior and neural code when registering extracelluIarly. Final performance of any spike sorting m...
Alexey N. Pavlov, Valeri A. Makarov, Ioulia Makaro...
152
Voted
ICMCS
2005
IEEE
172views Multimedia» more  ICMCS 2005»
15 years 9 months ago
A Study of Synthesizing New Human Motions from Sampled Motions Using Tensor Decomposition
This paper applies an algorithm, based on Tensor Decomposition, to a new synthesis application: by using sampled motions of people of different ages under different emotional stat...
Rovshan Kalanov, Jieun Cho, Jun Ohya