Detection theory

Results: 1119



#Item
501Electromagnetism / Gabor filter / Integral transforms / Filter theory / Image processing / Filter / Electronic filter / Edge detection / Wavelet / Electronic engineering / Electronics / Computer vision

Microsoft Word - bissi_jvcir_2013.doc

Add to Reading List

Source URL: dsplab.diei.unipg.it

Language: English - Date: 2014-11-03 05:47:31
502Audio engineering / Noise / Electronics / Pitch detection algorithm / Estimation theory / Pink noise / Signal-to-noise ratio / Spectral density / Window function / Signal processing / Digital signal processing / Statistics

Automatic Transcription of Musical Recordings Anssi Klapuri1, Tuomas Virtanen1, Antti Eronen1, Jarno Seppänen2 1 Tampere University of Technology, P.O.Box 553, FIN[removed]Tampere, Finland 2Nokia Research Center, P.O.Box

Add to Reading List

Source URL: www.cs.tut.fi

Language: English - Date: 2001-08-31 21:18:16
503Data transmission / Information / Information theory / Computing / Graphics file formats / Bit error rate / Peak signal-to-noise ratio / JPEG / Forward error correction / Telecommunications engineering / Coding theory / Error detection and correction

IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. VV, NO. NN, MONTH YYYY (TIP[removed]R2) 1 Error Protection and Interleaving for Wireless Transmission of JPEG 2000 Images and Video

Add to Reading List

Source URL: dsplab.diei.unipg.it

Language: English - Date: 2014-11-03 05:47:31
504Computing / Electronics / Evaluation / Coding theory / Interleaving / Computer file formats / JPEG / Forward error correction / Reed–Solomon error correction / Error detection and correction / ISO standards / Graphics file formats

Microsoft Word - icme_11.doc

Add to Reading List

Source URL: dsplab.diei.unipg.it

Language: English - Date: 2014-11-03 05:47:31
505Interpretation / NIP / Philosophy / Linguistics / Model theory / Logic / Constructible universe

Object Detection with Grammar Models Ross B. Girshick Dept. of Computer Science University of Chicago Chicago, IL 60637

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-05-01 18:04:34
506Risk / Coding theory / Cartagena Protocol on Biosafety / Error detection and correction / Local loop / Loop Maintenance Operations System / Biodiversity

CASE STUDY 29: Customs officer looks for laboratories for detection and identification of LMOs Objective: Use the BCH Central Portal to find laboratories for detection and identification of LMOs

Add to Reading List

Source URL: bch.cbd.int

Language: English - Date: 2013-03-25 15:46:03
507Ordinal numbers / Analysis of algorithms / Asymptotically optimal algorithm / Code / First uncountable ordinal / Symbol / Mathematical logic / Mathematics / Set theory

Cascade Object Detection with Deformable Part Models∗ Pedro F. Felzenszwalb University of Chicago Ross B. Girshick University of Chicago

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-05-01 18:04:34
508Coding theory / Network architecture / Network protocols / Finite fields / Information theory / Packet loss / Network coding / Retransmission / Robust random early detection / Network performance / Computing / Information

Completion Delay Reduction in Lossy Feedback Scenarios for Instantly Decodable Network Coding Sameh Sorour and Shahrokh Valaee The Edward S. Rogers Sr. Department of Electrical and Computer Engineering University of Toro

Add to Reading List

Source URL: www.comm.utoronto.ca

Language: English - Date: 2011-12-22 20:41:44
509Biostatistics / Data mining / Detection theory / Receiver operating characteristic / Socioeconomics / Statistical classification / Fire blight / Potato / Blight / Biology / Food and drink / Statistics

Ecology and Epidemiology A Statistical Comparison of the Blossom Blight Forecasts of MARYBLYT and Cougarblight with Receiver Operating Characteristic Curve Analysis M. M. Dewdney, A. R. Biggs, and W. W. Turechek

Add to Reading List

Source URL: www.caf.wvu.edu

Language: English - Date: 2007-08-10 08:08:02
510Machine learning / Data security / National security / Computing / Cyberwarfare / Malware / Anomaly detection / Computational learning theory / Antivirus software / Security / Computer security / Computer network security

Volume 3, Issue 1, January – December[removed]Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop[removed]Anthony D. Joseph, Pavel Laskov, Fabio Roli, J. Doug Tygar, and Blaine Nelson .

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2014-10-15 03:25:19
UPDATE