Sciweavers

232 search results - page 19 / 47
» Comparison of Outlier Detection Methods in Fault-proneness M...
Sort
View
RAID
2009
Springer
14 years 2 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...
ICCV
2007
IEEE
14 years 2 months ago
A Multi-Image Restoration Method for Image Reconstruction from Projections
in Proc. IEEE Int’l Conf. on Computer Vision (ICCV), October, 2007 Traditional Bayesian restoration methods depend heavily on the accuracy of underlying generative models. For t...
Yunqiang Chen, Lin Cheng, Tong Fang, Rainer Raupac...
TACAS
2009
Springer
144views Algorithms» more  TACAS 2009»
14 years 8 days ago
Computing Optimized Representations for Non-convex Polyhedra by Detection and Removal of Redundant Linear Constraints
Abstract. We present a method which computes optimized representations for non-convex polyhedra. Our method detects so-called redundant linear constraints in these representations ...
Christoph Scholl, Stefan Disch, Florian Pigorsch, ...
DMIN
2006
124views Data Mining» more  DMIN 2006»
13 years 9 months ago
Use of Multivariate Data Analysis for Lumber Drying Process Monitoring and Fault Detection
Process monitoring refers to the task of detecting abnormal process operations resulting from the shift in the mean and/or the variance of one or more process variables. To success...
Mouloud Amazouz, Radu Pantea
ICRA
2009
IEEE
117views Robotics» more  ICRA 2009»
14 years 2 months ago
Modeling RFID signal strength and tag detection for localization and mapping
— In recent years, there has been an increasing interest within the robotics community in investigating whether Radio Frequency Identification (RFID) technology can be utilized ...
Dominik Joho, Christian Plagemann, Wolfram Burgard