Sciweavers

4650 search results - page 634 / 930
» Generating and evaluating evaluative arguments
Sort
View
IDA
2009
Springer
15 years 11 months ago
Cumulative State Coherence Transform for a Robust Two-Channel Multiple Source Localization
This work presents a novel robust method for a two-channel multiple Time Difference of Arrival (TDOA) estimation. The method is based on a recursive frequency-domain Independent C...
Francesco Nesta, Piergiorgio Svaizer, Maurizio Omo...
ISVC
2009
Springer
15 years 11 months ago
Factorization of Correspondence and Camera Error for Unconstrained Dense Correspondence Applications
Abstract. A correspondence and camera error analysis for dense correspondence applications such as structure from motion is introduced. This provides error introspection, opening u...
Daniel Knoblauch, Mauricio Hess-Flores, Mark A. Du...
LOCA
2009
Springer
15 years 11 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung
PKDD
2009
Springer
95views Data Mining» more  PKDD 2009»
15 years 11 months ago
Non-redundant Subgroup Discovery Using a Closure System
Subgroup discovery is a local pattern discovery task, in which descriptions of subpopulations of a database are evaluated against some quality function. As standard quality functio...
Mario Boley, Henrik Grosskreutz
RAID
2009
Springer
15 years 11 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...