Sciweavers

949 search results - page 162 / 190
» ISAC - Instance-Specific Algorithm Configuration
Sort
View
ICA
2010
Springer
13 years 8 months ago
A General Modular Framework for Audio Source Separation
Most of audio source separation methods are developed for a particular scenario characterized by the number of sources and channels and the characteristics of the sources and the m...
Alexey Ozerov, Emmanuel Vincent, Fréd&eacut...
CIDM
2007
IEEE
13 years 8 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
ACTA
2010
191views more  ACTA 2010»
13 years 8 months ago
Automata-based verification of programs with tree updates
This paper describes an effective verification procedure for imperative programs that handle (balanced) tree-like data structures. Since the verification problem considered is unde...
Peter Habermehl, Radu Iosif, Tomás Vojnar
AROBOTS
2010
126views more  AROBOTS 2010»
13 years 8 months ago
Contact sensing and grasping performance of compliant hands
Limitations in modern sensing technologies result in large errors in sensed target object geometry and location in unstructured environments. As a result, positioning a robotic end...
Aaron M. Dollar, Leif P. Jentoft, Jason H. Gao, Ro...
AUTOMATICA
2010
94views more  AUTOMATICA 2010»
13 years 8 months ago
Optimality analysis of sensor-target localization geometries
The problem of target localization involves estimating the position of a target from multiple and typically noisy measurements of the target position. It is well known that the re...
Adrian N. Bishop, Baris Fidan, Brian D. O. Anderso...