Sciweavers

1737 search results - page 312 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
WCRE
2006
IEEE
14 years 3 months ago
Extracting Output Formats from Executables
We describe the design and implementation of FFE/x86 (File-Format Extractor for x86), an analysis tool that works on stripped executables (i.e., neither source code nor debugging ...
Junghee Lim, Thomas W. Reps, Ben Liblit
ICANN
2003
Springer
14 years 2 months ago
Dimension Reduction Based on Orthogonality - A Decorrelation Method in ICA
In independent component analysis problems, when we use a one-unit objective function to iteratively estimate several independent components, the uncorrelatedness between the indep...
Kun Zhang, Lai-Wan Chan
JMLR
2012
11 years 11 months ago
On Nonparametric Guidance for Learning Autoencoder Representations
Unsupervised discovery of latent representations, in addition to being useful for density modeling, visualisation and exploratory data analysis, is also increasingly important for...
Jasper Snoek, Ryan Prescott Adams, Hugo Larochelle
PR
2008
97views more  PR 2008»
13 years 9 months ago
A vision-based method for weeds identification through the Bayesian decision theory
One of the objectives of precision agriculture is to minimize the volume of herbicides that are applied to the fields through the use of site-specific weed management systems. Thi...
Alberto Tellaeche, Xavier P. Burgos-Artizzu, Gonza...
CGA
1999
13 years 8 months ago
Visualizing Large Telecommunication Data Sets
displays to abstract network data and let users interactwithit.Wehaveimplementedafull-scaleSwift3D prototype, which generated the examples we present here. Swift-3D We developed Sw...
Eleftherios Koutsofios, Stephen C. North, Daniel A...