Sciweavers

1875 search results - page 346 / 375
» Kernel Methods for Pattern Analysis
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
CIVR
2007
Springer
164views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Inducing a perceptual relevance shape classifier
In this paper, we develop a system to classify the outputs of image segmentation algorithms as perceptually relevant or perceptually irrelevant with respect to human perception. T...
Victoria J. Hodge, John P. Eakins, James Austin
MTDT
2003
IEEE
164views Hardware» more  MTDT 2003»
14 years 28 days ago
Applying Defect-Based Test to Embedded Memories in a COT Model
ct Defect-based testing for digital logic concentrates primarily on methods of test application, including for example at-speed structural tests and IDDQ testing. In contrast, defe...
Robert C. Aitken
AIPR
2004
IEEE
13 years 11 months ago
Feasibility Study for the Development of a Motion Imagery Quality Metric
The motion imagery community would benefit from the availability of standard measures for assessing image interpretability. The National Imagery Interpretability Rating Scale (NII...
John M. Irvine, Charles Fenimore, David M. Cannon,...
NIPS
2001
13 years 9 months ago
Spike timing and the coding of naturalistic sounds in a central auditory area of songbirds
In nature, animals encounter high dimensional sensory stimuli that have complex statistical and dynamical structure. Attempts to study the neural coding of these natural signals f...
B. D. Wright, Kamal Sen, William Bialek, A. J. Dou...