Graphical models of brain functional connectivity have matured from con rming a priori hypotheses to an exploratory tool for discovering unknown connectivity. However, exploratory...
Audio authentication is important in content delivery via untrusted intermediaries, for example peer-to-peer (P2P) file sharing. Many differently encoded versions of the original...
Nonnegative Tucker decomposition (NTD) is a recent multiway extension of nonnegative matrix factorization (NMF), where nonnegativity constraints are incorporated into Tucker model...
Cardiac magnetic resonance imaging (MRI) is very challenging due to the perpetual heart movements. This movement is pseudo-periodic and implies several issues for image acquisitio...
Dimensionality reduction (DR) is a major issue to improve the efficiency of the classifiers in Hyperspectral images (HSI). Recently, the independent component analysis (ICA) app...
The performance of speaker recognition systems drop significantly under noisy conditions. To improve robustness, we have recently proposed novel auditory features and a robust spe...
Component forensics is an emerging methodology for forensic analysis that aims at estimating the algorithms and parameters in each component of a digital device. This paper propos...
We derive a novel method to determine the parameters for regularized super-resolution problems. The proposed approach relies on the Joint Maximum a Posteriori (JMAP) estimation te...
In this work, we implement a real-time visual tracker that targets the position and 3D pose of objects in video sequences, specifically faces. Using Stream Processors for perform...
We propose an extension of EFICA algorithm for piecewise stationary and non Gaussian signals. The proposed method is able to profit from varying distribution of the original sign...