Sciweavers

3674 search results - page 267 / 735
» Information Dependencies
Sort
View
MA
2010
Springer
147views Communications» more  MA 2010»
13 years 9 months ago
On asymptotic normality of sequential LS-estimate for unstable autoregressive process AR(2)
For estimating parameters in an unstable AR(2) model, the paper proposes a sequential least squares estimate with a special stopping time defined by the trace of the observed Fis...
Leonid Galtchouk, Victor Konev
SOFTVIS
2010
ACM
13 years 9 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
ICDM
2010
IEEE
148views Data Mining» more  ICDM 2010»
13 years 8 months ago
Comparing Vessel Trajectories Using Geographical Domain Knowledge and Alignments
Abstract--This paper presents a similarity measure that combines low-level trajectory information with geographical domain knowledge to compare vessel trajectories. The similarity ...
Gerben de Vries, Willem Robert van Hage, Maarten v...
IH
2010
Springer
13 years 8 months ago
The Influence of the Image Basis on Modeling and Steganalysis Performance
Abstract. We compare two image bases with respect to their capabilities for image modeling and steganalysis. The first basis consists of wavelets, the second is a Laplacian pyramid...
Valentin Schwamberger, Pham Hai Dang Le, Bernhard ...
ISW
2010
Springer
13 years 8 months ago
Implicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these...
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Ch...