Detection theory

Results: 1119



#Item
391Econometrics / Parametric statistics / Statistical inference / Ordinary least squares / Estimator / Bias of an estimator / Variance / Linear regression / Instrumental variable / Statistics / Estimation theory / Regression analysis

7. A framework for quantitatively advancing detection studies to begin to rigorously consider the internal consistency of state-ofthe-art climate models “Stage 4 studies differ from the earlier categories in their use

Add to Reading List

Source URL: www.cru.uea.ac.uk

Language: English - Date: 2009-12-22 04:43:47
392Change detection / Exponentials / Statistical tests / CUSUM / Structural break / Maximum likelihood / Sufficient statistic / Normal distribution / Control chart / Statistics / Statistical theory / Estimation theory

Nonlin. Processes Geophys., 21, 1133–1143, 2014 www.nonlin-processes-geophys.net[removed]doi:[removed]npg[removed] © Author(s[removed]CC Attribution 3.0 License. Instability and change detection in exponentia

Add to Reading List

Source URL: www.nonlin-processes-geophys.net

Language: English - Date: 2014-12-04 10:34:37
393Mathematics / Discrete mathematics / Noisy-channel coding theorem / Typical set / Binary symmetric channel / Error detection and correction / Binary erasure channel / Entropy / Z-channel / Information theory / Coding theory / Information

Information Theory, Pattern Recognition and Neural Networks Part III Physics, January 2007 Please work on the following exercise before lecture 2. The weighing problem

Add to Reading List

Source URL: wol.ra.phy.cam.ac.uk

Language: English - Date: 2007-01-25 12:38:17
394Variance / Science / Mathematical sciences / Information / 3D imaging / Voxel / Information theory

GRAVIMETRIC DETECTION BY COMPRESSED SENSING Marina Meil˘a, Caren Marzban Ulvi Yurtsever University of Washington

Add to Reading List

Source URL: www.stat.washington.edu

Language: English - Date: 2013-07-04 22:35:59
395Mathematics / Theoretical computer science / Information / Information theory / Computational complexity theory / List decoding / Concatenated error correction code / BCH code / Chernoff bound / Coding theory / Error detection and correction / Finite fields

On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:20:25
396Mathematics / Discrete mathematics / Noisy-channel coding theorem / Typical set / Binary symmetric channel / Error detection and correction / Entropy / Binary erasure channel / Z-channel / Information theory / Coding theory / Information

Information Theory, Pattern Recognition and Neural Networks Part III Physics, January 2008 Please work on the following exercise before lecture 2. The weighing problem You are given 12 balls, all equal in weight except

Add to Reading List

Source URL: wol.ra.phy.cam.ac.uk

Language: English - Date: 2008-02-13 08:28:05
397Combinatorics / Dense subgraph / Graph / Hypergraph / Graph theory / Mathematics / Theoretical computer science

ALID: Scalable Dominant Cluster Detection Lingyang Chu Shuhui Wang Siyuan Liu

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2015-03-13 13:53:57
398Mathematics / Information / Fingerprint / List decoding / Concatenated error correction code / Reed–Solomon error correction / Digital video fingerprinting / Coding theory / Error detection and correction / Theoretical computer science

On watermarking/fingerprinting for copyright protection Hans Georg Schaathun Abstract Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorised

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2005-12-08 10:13:37
399Hash function / Field-programmable gate array / Computer science / Electronics / Applied mathematics / Models of computation / Automata theory / Finite-state machine

HC17.S2T3 High-Performance Pattern-Matching Engine for Intrusion Detection.ppt

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2013-07-27 23:45:52
400Information / Telecommunications engineering / Forward error correction / Network packet / Hamming / Bit error rate / Transmission Control Protocol / Reed–Solomon error correction / Parity bit / Error detection and correction / Coding theory / Information theory

Forward Error Correction in Sensor Networks Jaein Jeong and Cheng Tien Ee Department of Electrical Engineering and Computer Science University of California, Berkeley May 16, 2003

Add to Reading List

Source URL: webs.cs.berkeley.edu

Language: English - Date: 2003-06-13 19:31:17
UPDATE