• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,640
Next 10 →

Robust principal component analysis?

by Emmanuel J Candès , Xiaodong Li , Yi Ma , John Wright - Journal of the ACM, , 2011
"... Abstract This paper is about a curious phenomenon. Suppose we have a data matrix, which is the superposition of a low-rank component and a sparse component. Can we recover each component individually? We prove that under some suitable assumptions, it is possible to recover both the low-rank and the ..."
Abstract - Cited by 569 (26 self) - Add to MetaCart
analysis since our methodology and results assert that one can recover the principal components of a data matrix even though a positive fraction of its entries are arbitrarily corrupted. This extends to the situation where a fraction of the entries are missing as well. We discuss an algorithm for solving

Recognition-by-components: A theory of human image understanding

by Irving Biederman - Psychological Review , 1987
"... The perceptual recognition of objects is conceptualized to be a process in which the image of the input is segmented at regions of deep concavity into an arrangement of simple geometric components, such as blocks, cylinders, wedges, and cones. The fundamental assumption of the proposed theory, recog ..."
Abstract - Cited by 1272 (23 self) - Add to MetaCart
, recognition-by-components (RBC), is that a modest set of generalized-cone components, called geons (N ^ 36), can be derived from contrasts of five readily detectable properties of edges in a two-dimensional image: curvature, collinearity, symmetry, parallelism, and cotermmation. The detection

Composable memory transactions

by Tim Harris, Mark Plesko, Avraham Shinnar, David Tarditi - In Symposium on Principles and Practice of Parallel Programming (PPoPP , 2005
"... Atomic blocks allow programmers to delimit sections of code as ‘atomic’, leaving the language’s implementation to enforce atomicity. Existing work has shown how to implement atomic blocks over word-based transactional memory that provides scalable multiprocessor performance without requiring changes ..."
Abstract - Cited by 509 (43 self) - Add to MetaCart
repeatedly in an atomic block), (3) we use runtime filtering to detect duplicate log entries that are missed statically, and (4) we present a series of GC-time techniques to compact the logs generated by long-running atomic blocks. Our implementation supports short-running scalable concurrent benchmarks

Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks

by Jean-Paul Linnartz, Ton Kalker, Geert Depovere
"... We extend existing models for evaluating the reliability of detecting electronic watermarks in digital images. Probabilities of incorrect detections (missed detection and false alarms) are expressed in terms of the watermark-energy-to-image-variance power ratio. We present some counterintuitive resu ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
We extend existing models for evaluating the reliability of detecting electronic watermarks in digital images. Probabilities of incorrect detections (missed detection and false alarms) are expressed in terms of the watermark-energy-to-image-variance power ratio. We present some counterintuitive

Miss detection ratio (%) Correct sensing ratio

by unknown authors
"... • Spectrum is an essential resource for the provision of mobile services. • However, most of the licensed spectrum is under-utilized • The spectrum shortage problem can be alleviated using a new promising technology: Cognitive Radio A CR is a system that senses its electromagnetic environment and ca ..."
Abstract - Add to MetaCart
and can dynamically and autonomously adjust its operating parameters to access the spectrum. Distributed spectrum sensing (DSS) CR terminals form self-organizing networks capable to detect vacant spectrum bands that can be used for transmission Top priority: avoid harmful interference with primary users

Missed detection problems in the cardinalized probability hypothesis density filter

by M. Ulmke, M. Schmidt, Eads Deutschland Gmbh - In Information Fusion, 2008 11th International Conference on , 2008
"... Abstract — The cardinalized probability hypothesis density (CPHD) filter is a recursive Bayesian algorithm for estimating multiple target states with varying target number in clutter. In the present work, it is shown that a missed detection in one part of the field of view has a significant effect o ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract — The cardinalized probability hypothesis density (CPHD) filter is a recursive Bayesian algorithm for estimating multiple target states with varying target number in clutter. In the present work, it is shown that a missed detection in one part of the field of view has a significant effect

A First Step towards Automated Detection of Buffer Overrun Vulnerabilities

by David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken - IN NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM , 2000
"... We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as an integer range analysis problem. One major advantage of static analysis is that security bugs can ..."
Abstract - Cited by 394 (9 self) - Add to MetaCart
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as an integer range analysis problem. One major advantage of static analysis is that security bugs

Simplify: A theorem prover for program checking

by David Detlefs, Greg Nelson, James B. Saxe - J. ACM , 2003
"... This paper provides a detailed description of the automatic theorem prover Simplify, which is the proof engine of the Extended Static Checkers ESC/Java and ESC/Modula-3. Simplify uses the Nelson-Oppen method to combine decision procedures for several important theories, and also employs a matcher to ..."
Abstract - Cited by 431 (2 self) - Add to MetaCart
to reason about quantifiers. Instead of conventional matching in a term DAG, Simplify matches up to equivalence in an E-graph, which detects many relevant pattern instances that would be missed by the conventional approach. The paper describes two techniques, labels and counterexample contexts, for helping

Research Article Efficient Data Association in Visual Sensor Networks with Missing Detection

by Jiuqing Wan, Qingyun Liu
"... which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. One of the fundamental requirements for visual surveillance with Visual Sensor Networks (VSN) is the correct association of camera’s observations with the tracks of objects und ..."
Abstract - Add to MetaCart
under tracking. In this paper, we model the data association in VSN as an inference problem on dynamic Bayesian networks (DBN) and investigate the key problems for efficient data association in case of missing detection. Firstly, to deal with the problem of missing detection, we introduce a set

Statistical Analysis of the Performance of MDL Enumeration for Multiple-Missed Detection in Array Processing

by Fei Du, Yibo Li, Shijiu Jin - SENSORS , 2015
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 4,640
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University