Sciweavers

382 search results - page 47 / 77
» Operational performances of a MUSIC algorithm robust to outl...
Sort
View
GECCO
2005
Springer
155views Optimization» more  GECCO 2005»
14 years 2 months ago
Mission planning for joint suppression of enemy air defenses using a genetic algorithm
In this paper we present a genetic algorithm applied to the problem of mission planning for Joint Suppression of Enemy Air Defenses (JSEAD) in support of air strike operations. Th...
Jeffrey P. Ridder, Jason C. HandUber
HT
2009
ACM
14 years 3 months ago
Cross-tagging for personalized open social networking
The Social Web is successfully established and poised for continued growth. Web 2.0 applications such as blogs, bookmarking, music, photo and video sharing systems are among the m...
Avare Stewart, Ernesto Diaz-Aviles, Wolfgang Nejdl...
ICASSP
2010
IEEE
13 years 9 months ago
Speech enhancement in transient noise environment using diffusion filtering
Recently, we have presented a transient noise reduction algorithm for speech signals that relies on non-local diffusion filtering. By exploiting the repetitive nature of transien...
Ronen Talmon, Israel Cohen, Sharon Gannot
ICRA
1998
IEEE
121views Robotics» more  ICRA 1998»
14 years 1 months ago
Real-Time Estimation of Dominant Motion in Underwater Video Images for Dynamic Positioning
In this paper, we propose a 2D visual motion estimation method which can be exploited to achieve a dynamic positioning (eg. by gaze control) with respect to a sea-bottom area of i...
Fabien Spindler, Patrick Bouthemy
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 3 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...