We present a robust algorithm for independent component analysis that uses the sum of marginal quadratic negentropies as a dependence measure. It can handle arbitrary source densit...
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Abstract. We show that eigenvector decomposition can be used to extract a term taxonomy from a given collection of text documents. So far, methods based on eigenvector decompositio...
Holger Bast, Georges Dupret, Debapriyo Majumdar, B...
spike separation is a basic prerequisite for analyzing of the cooperative neural behavior and neural code when registering extracelluIarly. Final performance of any spike sorting m...
Alexey N. Pavlov, Valeri A. Makarov, Ioulia Makaro...
This paper presents the results of an investigation into the use of machine learning methods for the identification of narcotics from Raman spectra. The classification of spectr...
Tom Howley, Michael G. Madden, Marie-Louise O'Conn...