Sciweavers

1150 search results - page 180 / 230
» Note from the Editor
Sort
View
VIROLOGY
2010
165views more  VIROLOGY 2010»
13 years 2 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
ICASSP
2011
IEEE
12 years 11 months ago
Clustering NMF basis functions using Shifted NMF for monaural sound source separation
Non-negative Matrix Factorization (NMF) has found use in single channel separation of audio signals, as it gives a parts-based decomposition of audio spectrograms where the parts ...
Rajesh Jaiswal, Derry Fitzgerald, Dan Barry, Eugen...
DMGT
2011
94views more  DMGT 2011»
12 years 11 months ago
Closed k-stop distance in graphs
The Traveling Salesman Problem (TSP) is still one of the most researched topics in computational mathematics, and we introduce a variant of it, namely the study of the closed k-wa...
Grady Bullington, Linda Eroh, Ralucca Gera, Steven...
SDM
2011
SIAM
198views Data Mining» more  SDM 2011»
12 years 10 months ago
Exemplar-based Robust Coherent Biclustering
The biclustering, co-clustering, or subspace clustering problem involves simultaneously grouping the rows and columns of a data matrix to uncover biclusters or sub-matrices of the...
Kewei Tu, Xixiu Ouyang, Dingyi Han, Vasant Honavar
ACII
2011
Springer
12 years 7 months ago
Are You Friendly or Just Polite? - Analysis of Smiles in Spontaneous Face-to-Face Interactions
This work is part of a research effort to understand and characterize the morphological and dynamic features of polite and amused smiles. We analyzed a dataset consisting of young ...
Mohammed E. Hoque, Louis-Philippe Morency, Rosalin...