Sciweavers

238 search results - page 33 / 48
» A Constraint Learning Algorithm for Blind Source Separation
Sort
View
IWDW
2004
Springer
14 years 1 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...
IDA
2009
Springer
13 years 5 months ago
Estimating Hidden Influences in Metabolic and Gene Regulatory Networks
We address the applicability of blind source separation (BSS) methods for the estimation of hidden influences in biological dynamic systems such as metabolic or gene regulatory net...
Florian Blöchl, Fabian J. Theis
IJON
2008
116views more  IJON 2008»
13 years 7 months ago
Discovering speech phones using convolutive non-negative matrix factorisation with a sparseness constraint
Discovering a representation that allows auditory data to be parsimoniously represented is useful for many machine learning and signal processing tasks. Such a representation can ...
Paul D. O'Grady, Barak A. Pearlmutter
ISCAS
2008
IEEE
217views Hardware» more  ISCAS 2008»
14 years 2 months ago
Approximate L0 constrained non-negative matrix and tensor factorization
— Non-negative matrix factorization (NMF), i.e. V ≈ WH where both V, W and H are non-negative has become a widely used blind source separation technique due to its part based r...
Morten Mørup, Kristoffer Hougaard Madsen, L...
IJCNN
2006
IEEE
14 years 1 months ago
Classifying Single-Trial ERPs from Visual and Frontal Cortex during Free Viewing
—Event-related potentials (ERPs) recorded at the scalp are indicators of brain activity associated with eventrelated information processing; hence they may be suitable for the as...
Akaysha C. Tang, Matthew T. Sutherland, Christophe...