Sciweavers

27 search results - page 4 / 6
» Classification of signature-only signature models
Sort
View
SIAMIS
2010
156views more  SIAMIS 2010»
13 years 2 months ago
Learning the Morphological Diversity
This article proposes a new method for image separation into a linear combination of morphological components. Sparsity in fixed dictionaries is used to extract the cartoon and osc...
Gabriel Peyré, Jalal Fadili, Jean-Luc Starc...
ICRA
1999
IEEE
155views Robotics» more  ICRA 1999»
13 years 11 months ago
3-D Cueing: A Data Filter for Object Recognition
This paper presents a novel method for quickly filtering range data points to make object recognition in large 3D data sets feasible. The general approach, called "3D cueing,...
Owen T. Carmichael, Martial Hebert
FLAIRS
2006
13 years 8 months ago
Fuzzy Model Optimization Using Genetic Algorithm for Aircraft Engine Diagnosis
An accurate and up-to-date diagnostic model is critical for economic aircraft engine operation. However, for many commercial airline fleets, monitoring and diagnosing engine fault...
LiJie Yu, Daniel J. Cleary, Mark D. Osborn, Vrinda...
BMCBI
2008
109views more  BMCBI 2008»
13 years 7 months ago
MetaFIND: A feature analysis tool for metabolomics data
Background: Metabolomics, or metabonomics, refers to the quantitative analysis of all metabolites present within a biological sample and is generally carried out using NMR spectro...
Kenneth Bryan, Lorraine Brennan, Padraig Cunningha...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...