Sciweavers

949 search results - page 162 / 190
» ISAC - Instance-Specific Algorithm Configuration
Sort
View
ICA
2010
Springer
14 years 12 months ago
A General Modular Framework for Audio Source Separation
Most of audio source separation methods are developed for a particular scenario characterized by the number of sources and channels and the characteristics of the sources and the m...
Alexey Ozerov, Emmanuel Vincent, Fréd&eacut...
CIDM
2007
IEEE
14 years 12 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
ACTA
2010
191views more  ACTA 2010»
14 years 12 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar
AROBOTS
2010
126views more  AROBOTS 2010»
14 years 12 months ago
Contact sensing and grasping performance of compliant hands
Limitations in modern sensing technologies result in large errors in sensed target object geometry and location in unstructured environments. As a result, positioning a robotic end...
Aaron M. Dollar, Leif P. Jentoft, Jason H. Gao, Ro...
AUTOMATICA
2010
94views more  AUTOMATICA 2010»
14 years 12 months ago
Optimality analysis of sensor-target localization geometries
The problem of target localization involves estimating the position of a target from multiple and typically noisy measurements of the target position. It is well known that the re...
Adrian N. Bishop, Baris Fidan, Brian D. O. Anderso...