Sciweavers

204 search results - page 18 / 41
» Generalized Singular Value Thresholding
Sort
View
ISCAS
2003
IEEE
98views Hardware» more  ISCAS 2003»
14 years 23 days ago
Minimum selection GSC and adaptive low-power rake combining scheme
In this paper, we investigate a new generalized selection combining (GSC) technique and an adaptive rake combining scheme to save the power consumption of mobile rake receivers fo...
Suk Won Kim, Dong Sam Ha, Jeffrey H. Reed
TSMC
2002
80views more  TSMC 2002»
13 years 7 months ago
Performance metric alerting: a new design approach for complex alerting problems
Alerting systems and related decision-making automation are widely used to enhance the safety and capability of controlled processes across many applications. Traditional alerting ...
L. C. Yang, J. K. Kuchar
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
11 years 10 months ago
Fast bregman divergence NMF using taylor expansion and coordinate descent
Non-negative matrix factorization (NMF) provides a lower rank approximation of a matrix. Due to nonnegativity imposed on the factors, it gives a latent structure that is often mor...
Liangda Li, Guy Lebanon, Haesun Park
ICIP
2004
IEEE
14 years 9 months ago
Robust perceptual image hashing via matrix invariants
In this paper we suggest viewing images (as well as attacks on them) as a sequence of linear operators and propose novel hashing algorithms employing transforms that are based on ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
CORR
2010
Springer
268views Education» more  CORR 2010»
13 years 7 months ago
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or c...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...