Sciweavers

1496 search results - page 240 / 300
» Selection in the Presence of Noise
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
15 years 4 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ICANNGA
2007
Springer
191views Algorithms» more  ICANNGA 2007»
15 years 4 months ago
Novel Multi-layer Non-negative Tensor Factorization with Sparsity Constraints
In this paper we present a new method of 3D non-negative tensor factorization (NTF) that is robust in the presence of noise and has many potential applications, including multi-way...
Andrzej Cichocki, Rafal Zdunek, Seungjin Choi, Rob...
IMC
2005
ACM
15 years 3 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
ICCVW
1999
Springer
15 years 2 months ago
Optimization Criteria, Sensitivity and Robustness of Motion and Structure Estimation
The prevailing efforts to study the standard formulation of motion and structure recovery have been recently focused on issues of sensitivity and and robustness of existing techn...
Jana Kosecka, Yi Ma, Shankar Sastry
CVPR
2000
IEEE
15 years 1 months ago
Detection of Obstacles in the Flight Path of an Aircraft
The National Aeronautics and Space Administration (NASA), along with members of the aircraft industry, recently developed technologies for a new supersonic aircraft. One of the te...
Tarak Gandhi, Mau-Tsuen Yang, Rangachar Kasturi, O...