Sciweavers

6941 search results - page 1120 / 1389
» Testing as a Certification Approach
Sort
View
DAGM
2006
Springer
15 years 8 months ago
Robust MEG Source Localization of Event Related Potentials: Identifying Relevant Sources by Non-Gaussianity
Independent Component Analysis (ICA) is a frequently used preprocessing step in source localization of MEG and EEG data. By decomposing the measured data into maximally independent...
Peter Breun, Moritz Grosse-Wentrup, Wolfgang Utsch...
DAGM
2006
Springer
15 years 8 months ago
Realtime Depth Estimation and Obstacle Detection from Monocular Video
Abstract. This paper deals with the detection of arbitrary static objects in traffic scenes from monocular video using structure from motion. A camera in a moving vehicle observes ...
Andreas Wedel, Uwe Franke, Jens Klappstein, Thomas...
DAWAK
2006
Springer
15 years 8 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal
DIS
2006
Springer
15 years 8 months ago
Model-Based Estimation of Word Saliency in Text
Abstract. We investigate a generative latent variable model for modelbased word saliency estimation for text modelling and classification. The estimation algorithm derived is able ...
Xin Wang, Ata Kabán
DSN
2006
IEEE
15 years 8 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
« Prev « First page 1120 / 1389 Last » Next »