Sciweavers

1228 search results - page 105 / 246
» Copyright
Sort
View
93
Voted
ICML
2010
IEEE
14 years 11 months ago
From Transformation-Based Dimensionality Reduction to Feature Selection
Many learning applications are characterized by high dimensions. Usually not all of these dimensions are relevant and some are redundant. There are two main approaches to reduce d...
Mahdokht Masaeli, Glenn Fung, Jennifer G. Dy
73
Voted
ICASSP
2010
IEEE
14 years 10 months ago
High-resolution glyph-inspection based security system
: © High-Resolution Glyph-Inspection Based Security System Steven J. Simske, Guy Adams HP Laboratories HPL-2010-42 Image forensics, CMOS imaging, authentication, print parasitics,...
Steven J. Simske, Guy Adams
ICASSP
2010
IEEE
14 years 10 months ago
Performance analysis for blind identification of acoustic channels
: © Performance Analysis for Blind Identification of Acoustic Channels Majid Fozunbal HP Laboratories HPL-2009-333 Audio, acoustic systems, blind identification, dereverberation, ...
Majid Fozunbal
ICDE
2010
IEEE
180views Database» more  ICDE 2010»
14 years 10 months ago
Adaptive indexing for relational keys
: © Adaptive indexing for relational keys Goetz Graefe, Harumi Kuno HP Laboratories HPL-2010-23 databases, indexes, storage systems, B-trees, adaptive merging, database cracking A...
Goetz Graefe, Harumi A. Kuno
135
Voted
GLOBECOM
2008
IEEE
14 years 10 months ago
Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks
Network and service providers are rapidly deploying IPTV networks to deliver a wide variety of video content to subscribers. Some video content may be protected by copyright and/or...
Yali Liu, Canhui Ou, Zhi Li, Cherita L. Corbett, C...