Sciweavers

905 search results - page 107 / 181
» Shout detection in noise
Sort
View
KDD
1998
ACM
200views Data Mining» more  KDD 1998»
14 years 2 months ago
Fast Computation of 2-Dimensional Depth Contours
"Oneperson's noise is another person's signal." For manyapplications, including the detection of credit card frauds and the monitoringof criminal activities in...
Theodore Johnson, Ivy Kwok, Raymond T. Ng
AMR
2006
Springer
137views Multimedia» more  AMR 2006»
14 years 1 months ago
A General Principled Method for Image Similarity Validation
A novel and general criterion for image similarity validation is introduced using the so-called a contrario decision framework. It is mathematically proved that it is possible to c...
Frédéric Cao, Patrick Bouthemy
ICSAP
2010
14 years 1 days ago
Tamper Proofing 3D Models
- This paper describes a novel algorithm designed for tamper proofing of 3D models. Fragile watermarking is a known technique for detecting location of tamper in the artwork. Howev...
Mukesh C. Motwani, Balaji Sridharan, Rakhi C. Motw...
COLING
1994
13 years 11 months ago
A "not-so-shallow" parser for collocational analysis
Collocational analysis is the basis of many studies on lexical acquisition. Collocations are extracted from corpora using more or less shallow processing techniques, that span from...
Roberto Basili, Maria Teresa Pazienza, Paola Velar...
GECCO
2008
Springer
144views Optimization» more  GECCO 2008»
13 years 11 months ago
Multi-resistant radar jamming using genetic algorithms
The next generation of advanced self-protection jammers is expected to deliver effective and energy efficient jamming against modern air tracking radars. However, optimizing such ...
Hans Jonas Fossum Moen, Stein Kristoffersen