Sciweavers

1509 search results - page 153 / 302
» Depth from Scattering
Sort
View
SIGCOMM
2010
ACM
15 years 4 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
IJPRAI
2006
100views more  IJPRAI 2006»
15 years 4 months ago
Nearest Neighbor Discriminant Analysis
Linear Discriminant Analysis (LDA) is a popular feature extraction technique in statistical pattern recognition. However, it often suffers from the small sample size problem when ...
Xipeng Qiu, Lide Wu
SIAMIS
2008
93views more  SIAMIS 2008»
15 years 4 months ago
Convex Source Support and Its Application to Electric Impedance Tomography
The aim in electric impedance tomography is to recover the conductivity inside a physical body from boundary measurements of current and voltage. In many situations of practical im...
Martin Hanke, Nuutti Hyvönen, Stefanie Reussw...
EMISAIJ
2010
14 years 11 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
148
Voted
ICASSP
2011
IEEE
14 years 8 months ago
Source-normalised-and-weighted LDA for robust speaker recognition using i-vectors
The recently developed i-vector framework for speaker recognition has set a new performance standard in the research field. An i-vector is a compact representation of a speaker u...
Mitchell McLaren, David A. van Leeuwen