Sciweavers

5948 search results - page 277 / 1190
» Computing Robust Counter-Strategies
Sort
View
PAAPP
2002
150views more  PAAPP 2002»
15 years 3 months ago
Scalability analysis of parallel GMRES implementations
Applications involving large sparse nonsymmetric linear systems encourage parallel implementations of robust iterative solution methods, such as GMRES(k). Two parallel versions of...
Masha Sosonkina, Donald C. S. Allison, Layne T. Wa...
JCP
2008
164views more  JCP 2008»
15 years 2 months ago
K-Cosine Corner Detection
This study presents a boundary-based corner detection method that achieves robust detection for digital objects containing wide angles and various curves using curvature. The bound...
Te-Hsiu Sun
SIVP
2010
197views more  SIVP 2010»
15 years 2 months ago
Video watermarking using wavelet transform and tensor algebra
We present a robust, hybrid non-blind MPEG video watermarking technique based on a high-order tensor singular value decomposition and the discrete wavelet transform (DWT). The core...
Emad E. Abdallah, A. Ben Hamza, Prabir Bhattachary...
NN
2010
Springer
189views Neural Networks» more  NN 2010»
14 years 11 months ago
Sparse kernel learning with LASSO and Bayesian inference algorithm
Kernelized LASSO (Least Absolute Selection and Shrinkage Operator) has been investigated in two separate recent papers (Gao et al., 2008) and (Wang et al., 2007). This paper is co...
Junbin Gao, Paul W. Kwan, Daming Shi
TDSC
2010
168views more  TDSC 2010»
14 years 11 months ago
An Advanced Hybrid Peer-to-Peer Botnet
A "botnet" consists of a network of compromised computers controlled by an attacker ("botmaster"). Recently botnets have become the root cause of many Internet ...
Ping Wang, Sherri Sparks, Cliff Changchun Zou