Sciweavers

3639 search results - page 609 / 728
» Provenance as Dependency Analysis
Sort
View
83
Voted
CVIU
2006
160views more  CVIU 2006»
15 years 22 days ago
Automatic selection of edge detector parameters based on spatial and statistical measures
The basic and widely used edge detection operation in an image usually requires a prior step of setting the edge detector parameters (thresholds, blurring extent etc.). Finding th...
Raz Koren, Yitzhak Yitzhaky
110
Voted
ENTCS
2006
175views more  ENTCS 2006»
15 years 22 days ago
Observing Internet Worm and Virus Attacks with a Small Network Telescope
A network telescope is a portion of the IP address space which is devoted to observing inbound internet traffic. The purpose of a network telescope is to detect and log malicious ...
Uli Harder, Matt W. Johnson, Jeremy T. Bradley, Wi...
75
Voted
IJBC
2008
87views more  IJBC 2008»
15 years 22 days ago
Digital Secure-Communication Using Robust Hyper-Chaotic Systems
Abstract-- In this paper, we propose a robust hyperchaotic system that is practically serviceable in digital securecommunication. The system consists of many coupled robust logisti...
Shih-Liang Chen, Shu-Ming Chang, Wen-Wei Lin, Ting...
117
Voted
IJCV
2008
188views more  IJCV 2008»
15 years 22 days ago
Partial Linear Gaussian Models for Tracking in Image Sequences Using Sequential Monte Carlo Methods
The recent development of Sequential Monte Carlo methods (also called particle filters) has enabled the definition of efficient algorithms for tracking applications in image sequen...
Elise Arnaud, Étienne Mémin
130
Voted
FOCM
2006
97views more  FOCM 2006»
15 years 22 days ago
Learning Rates of Least-Square Regularized Regression
This paper considers the regularized learning algorithm associated with the leastsquare loss and reproducing kernel Hilbert spaces. The target is the error analysis for the regres...
Qiang Wu, Yiming Ying, Ding-Xuan Zhou