— Testing and verification are important methods for gaining confidence in the reliability of a software product. Keeping this confidence up is especially difficult for softw...
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
This paper presents a dereverberation method based on I-divergence minimization, which is particularly suitable for music signals. Existing dereverberation methods, including one ...
JPEG 2000 is a lossy integer-to-integer transform-based compression method that first quantizes the separable 2-D wavelet transform coefficients, then entropy codes them. The imag...
This paper proposes a new way to achieve feature point tracking using the entropy of the image. Sum of Squared Differences (SSD) is widely considered in differential trackers such ...