Sciweavers

123 search results - page 22 / 25
» A network intrusion detection method using independent compo...
Sort
View
DSP
2007
13 years 8 months ago
Blind separation of nonlinear mixtures by variational Bayesian learning
Blind separation of sources from nonlinear mixtures is a challenging and often ill-posed problem. We present three methods for solving this problem: an improved nonlinear factor a...
Antti Honkela, Harri Valpola, Alexander Ilin, Juha...
IWDW
2005
Springer
14 years 2 months ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
SDM
2010
SIAM
165views Data Mining» more  SDM 2010»
13 years 10 months ago
Direct Density Ratio Estimation with Dimensionality Reduction
Methods for directly estimating the ratio of two probability density functions without going through density estimation have been actively explored recently since they can be used...
Masashi Sugiyama, Satoshi Hara, Paul von Büna...
TIP
2008
344views more  TIP 2008»
13 years 8 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
GD
2008
Springer
13 years 9 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...