Sciweavers

137 search results - page 14 / 28
» Closed-loop Robust Identification Using the Indirect Approac...
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
Sparse LMS for system identification
We propose a new approach to adaptive system identification when the system model is sparse. The approach applies the ℓ1 relaxation, common in compressive sensing, to improve t...
Yilun Chen, Yuantao Gu, Alfred O. Hero III
MM
2005
ACM
179views Multimedia» more  MM 2005»
14 years 1 months ago
Automatic identification of digital video based on shot-level sequence matching
To locate a video clip in large collections is very important for retrieval applications, especially for digital rights management. In this paper, we present a novel technique for...
Jian Zhou, Xiao-Ping Zhang
ACSAC
2008
IEEE
14 years 2 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
FORTE
2004
13 years 9 months ago
Localizing Program Errors for Cimple Debugging
Abstract. We present automated techniques for the explanation of counterexamples, where a counter-example should be understood as a sequence of program statements. Our approach is ...
Samik Basu, Diptikalyan Saha, Scott A. Smolka
DAGM
2006
Springer
13 years 11 months ago
Robust MEG Source Localization of Event Related Potentials: Identifying Relevant Sources by Non-Gaussianity
Independent Component Analysis (ICA) is a frequently used preprocessing step in source localization of MEG and EEG data. By decomposing the measured data into maximally independent...
Peter Breun, Moritz Grosse-Wentrup, Wolfgang Utsch...