A parameter-choice method that exploits residual information

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Steganographic information hiding that exploits a novel file system vulnerability

In this paper, we present DupeFile, a simple yet critical security vulnerability in numerous file systems. By exploiting DupeFile, adversary can store two or more files with the same name/path, with different contents, inside the same volume. Consequently, data-exfiltration exploiting DupeFile vulnerability, hereafter called DupeFile Hiding, becomes simple and easy to execute. In DupeFile Hidin...

متن کامل

A Parameter Choice Method for Tikhonov Regularization

Abstract. A new parameter choice method for Tikhonov regularization of discrete ill-posed problems is presented. Some of the regularized solutions of a discrete ill-posed problem are less sensitive than others to the perturbations in the right-hand side vector. This method chooses one of the insensitive regularized solutions using a certain criterion. Numerical experiments show that the new met...

متن کامل

Projection onto a Polyhedron That Exploits

An algorithm is developed for projecting a point onto a polyhedron. The algorithm solves a dual version of the projection problem and then uses the relationship between the primal and dual to recover the projection. The techniques in the paper exploit sparsity. SpaRSA (Sparse Reconstruction by Separable Approximation) is used to approximately identify active constraints in the polyhedron, and t...

متن کامل

Projection onto a Polyhedron that Exploits Sparsity

An algorithm is developed for projecting a point onto a polyhedron. The algorithm solves a dual version of the projection problem and then uses the relationship between the primal and dual to recover the projection. The techniques in the paper exploit sparsity. Sparse reconstruction by separable approximation (SpaRSA) is used to approximately identify active constraints in the polyhedron, and t...

متن کامل

Gene expression data analysis with a dynamically extended self-organized map that exploits class information

MOTIVATION Currently the most popular approach to analyze genome-wide expression data is clustering. One of the major drawbacks of most of the existing clustering methods is that the number of clusters has to be specified a priori. Furthermore, by using pure unsupervised algorithms prior biological knowledge is totally ignored Moreover, most current tools lack an effective framework for tight i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: PAMM

سال: 2007

ISSN: 1617-7061,1617-7061

DOI: 10.1002/pamm.200700264