Sperm Whale Signal Analysis: Comparison using the AutoRegressive model and the Wavelets Transform
暂无分享,去创建一个
Christophe Laplanche | Maciej Lopatka | Olivier Adam | Jean-François Motsch | C. Laplanche | O. Adam | M. Lopatka | J. Motsch
[1] Yoshikiyo Kato,et al. Fault Detection by Mining Association Rules from House-keeping Data , 2001 .
[2] Dennis Abrazhevich,et al. Classification and Characteristics of Electronic Payment Systems , 2001, EC-Web.
[3] Abraham Silberschatz,et al. What Makes Patterns Interesting in Knowledge Discovery Systems , 1996, IEEE Trans. Knowl. Data Eng..
[4] Nicolaos B. Karayiannis,et al. Growing radial basis neural networks: merging supervised and unsupervised learning with network growth techniques , 1997, IEEE Trans. Neural Networks.
[5] C. Centeno. Building Security and Consumer Trust in Internet Payments , 2002 .
[6] B. R. Pekilis. Multi-Dimensional Separation of Concerns and IBM Hyper/J , 2002 .
[7] D. L. Donoho,et al. Ideal spacial adaptation via wavelet shrinkage , 1994 .
[8] Giuseppe Psaila. Discovery of Association Rule Meta-Patterns , 1999, DaWaK.
[9] Rm Cameron-Jones,et al. Instance Selection by Encoding Length Heuristic with Random Mutation Hill Climbing , 1995 .
[10] John Mark,et al. Introduction to radial basis function networks , 1996 .
[11] Robert P. W. Duin,et al. Novelty Detection Using Self-Organizing Maps , 1997, ICONIP.
[12] Michael B. Porter,et al. Automated model‐based localization of marine mammals near Hawaii , 2001 .
[13] Han Yi,et al. Trust and e-commerce: a study of consumer perceptions , 2003, Electron. Commer. Res. Appl..
[14] Tomás Isakowitz,et al. RMM: a methodology for structured hypermedia design , 1995, CACM.
[15] Stephen J. Roberts,et al. A Probabilistic Resource Allocating Network for Novelty Detection , 1994, Neural Computation.
[16] Dmitry O. Gorodnichy,et al. Affordable 3D Face Tracking Using Projective Vision , 2002 .
[17] Ray Hunt,et al. PKI and digital certification infrastructure , 2001, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..
[18] I. Hidaka,et al. Analysis of respiratory sinus arrhythmia with respect to respiratory phase. , 2000, Methods of information in medicine.
[19] Jens Krinke,et al. Aspect mining using event traces , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..
[20] Philip D. Wasserman,et al. Advanced methods in neural computing , 1993, VNR computer library.
[21] Robert T. Collins,et al. Multi-image focus of attention for rapid site model construction , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[22] J. Mead,et al. Measurement of the separate volume changes of rib cage and abdomen during breathing. , 1967, Journal of applied physiology.
[23] B. Krieger,et al. Calibration of respiratory inductive plethysmograph during natural breathing. , 1989, Journal of applied physiology.
[24] David B. Lowe,et al. A Framework for the Simulation of Web Applications , 2004, ICWE.
[25] Wolfram Burgard,et al. Monte Carlo Localization: Efficient Position Estimation for Mobile Robots , 1999, AAAI/IAAI.
[26] P. J. Skevington,et al. Trusted third parties in electronic commerce , 1997 .
[27] Mariano Ceccato,et al. Aspect mining through the formal concept analysis of execution traces , 2004, 11th Working Conference on Reverse Engineering.
[28] L. Lawrence Ho. Distributed Security Management in the Internet , 2004, Journal of Network and Systems Management.
[29] Paolo Tonella,et al. Building a Tool for the Analysis and Testing of Web Applications: Problems and Solutions , 2001, TACAS.
[30] Pablo Laguna,et al. Analysis of heart rate variability in the presence of ectopic beats using the heart timing signal , 2003, IEEE Transactions on Biomedical Engineering.
[31] L. Miller,et al. Sperm whale clicks: directionality and source level revisited. , 2000, The Journal of the Acoustical Society of America.
[32] Flavio Sartoretto,et al. Automatic detection of epileptiform activity by single-level wavelet analysis , 1999, Clinical Neurophysiology.
[33] John Goold,et al. Sound velocity measurements in spermaceti oil under the combined influences of temperature and pressure , 1996 .
[34] Marimuthu Palaniswami,et al. Effects of moving the centers in an RBF network , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).
[35] Yolanda González Cid,et al. Real-time 3d SLAM with wide-angle vision , 2004 .
[36] James A. Blumenthal,et al. Depression, Heart Rate Variability, and Acute Myocardial Infarction , 2001, Circulation.
[37] Margaret H. Dunham,et al. Data Mining: Introductory and Advanced Topics , 2002 .
[38] Balaji Padmanabhan,et al. Unexpectedness as a Measure of Interestingness in Knowledge Discovery , 1999, Decis. Support Syst..
[39] Arie van Deursen,et al. An Initial Experiment in Reverse Engineering Aspects from Existing Applications , 2004 .
[40] Adrian G. Bors,et al. Introduction of the Radial Basis Function (RBF) Networks , 2000 .
[41] Thomas G. Dietterich,et al. Improving the Performance of Radial Basis Function Networks by Learning Center Locations , 1991, NIPS.
[42] Andrew J. Davison,et al. Real-time simultaneous localisation and mapping with a single camera , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.
[43] Dino Pedreschi,et al. ExAMiner: optimized level-wise frequent pattern mining with monotone constraints , 2003, Third IEEE International Conference on Data Mining.
[44] Tony R. Martinez,et al. Reduction Techniques for Instance-Based Learning Algorithms , 2000, Machine Learning.
[45] Dennis L. Wilson,et al. Asymptotic Properties of Nearest Neighbor Rules Using Edited Data , 1972, IEEE Trans. Syst. Man Cybern..
[46] George Whitson,et al. Computer security: theory, process and management , 2003 .
[47] Giuseppe A. Di Lucca,et al. Testing Web applications , 2002, International Conference on Software Maintenance, 2002. Proceedings..
[48] Naveen Kumar,et al. Novelty Framework for Knowledge Discovery in Databases , 2004, DaWaK.
[49] Willis J. Tompkins,et al. A Real-Time QRS Detection Algorithm , 1985, IEEE Transactions on Biomedical Engineering.
[50] Abraham Silberschatz,et al. On Subjective Measures of Interestingness in Knowledge Discovery , 1995, KDD.
[51] Jian Pei,et al. Can we push more constraints into frequent pattern mining? , 2000, KDD '00.
[52] A. Porta,et al. Relationship between spectral components of cardiovascular variabilities and direct measures of muscle sympathetic nerve activity in humans. , 1997, Circulation.
[53] Stefanos Gritzalis,et al. Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture , 2000, Comput. Secur..
[54] Michael Unser,et al. A review of wavelets in biomedical applications , 1996, Proc. IEEE.
[55] Neil J. Gordon,et al. A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking , 2002, IEEE Trans. Signal Process..
[56] A. Malliani,et al. Cardiovascular Neural Regulation Explored in the Frequency Domain , 1991, Circulation.
[57] Dino Pedreschi,et al. Adaptive Constraint Pushing in Frequent Pattern Mining , 2003, PKDD.
[58] Carlos E. D'Attellis,et al. Detection of epileptic events in electroencephalograms using wavelet analysis , 2007, Annals of Biomedical Engineering.
[59] A. S. Al-Hegami,et al. Subjective Measures and their Role in Data Mining Process , 2004 .
[60] M A Sackner,et al. Non-invasive measurement of ventilation during exercise using a respiratory inductive plethysmograph. I. , 1980, The American review of respiratory disease.
[61] Michael Chesher,et al. Electronic Commerce and Business Communications , 1998, Practitioner Series.
[62] Arie van Deursen,et al. Aspect Mining and Refactoring , 2003 .
[63] Bernardo A. Huberman,et al. A methodology for managing risk in electronic transactions over the Internet , 2000 .
[64] N. Asokan,et al. Designing a Generic Payment Service , 1998, IBM Syst. J..
[65] Wynne Hsu,et al. Post-Analysis of Learned Rules , 1996, AAAI/IAAI, Vol. 1.
[66] Hsiao-Cheng Yu,et al. Electronic payment systems: an analysis and comparison of types , 2002 .
[67] Sung Yang Bang,et al. An Efficient Method to Construct a Radial Basis Function Neural Network Classifier , 1997, Neural Networks.
[68] Joydeep Ghosh,et al. Knowledge enhancement and reuse with radial basis function networks , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[69] D. Royston,et al. Non-Invasive Respiratory Monitoring , 1987 .
[70] P. Welch. The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms , 1967 .
[71] David L. Donoho,et al. De-noising by soft-thresholding , 1995, IEEE Trans. Inf. Theory.
[72] G. Paolisso,et al. Glucose ingestion affects cardiac ANS in healthy subjects with different amounts of body fat. , 1997, The American journal of physiology.
[73] Understanding Public Key Infrastructure ( PKI ) An RSA Data Security White Paper , 2022 .
[74] X Itu,et al. Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .
[75] Michael Isard,et al. CONDENSATION—Conditional Density Propagation for Visual Tracking , 1998, International Journal of Computer Vision.
[76] W. Mckenna,et al. Repolarization Aiternans: Techniques, Mechanisms, and Cardiac Vulnerability , 1997, Pacing and clinical electrophysiology : PACE.
[77] I. Johnstone,et al. Wavelet Shrinkage: Asymptopia? , 1995 .
[78] Tomoji Kishi,et al. On Aspect-Oriented Design-Applying “ Multi-Dimensional Separation of Concerns ” on Designing Quality Attributes - , 1999 .
[79] A. Orso,et al. Efficient and precise dynamic impact analysis using execute-after sequences , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[80] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[81] Paul J. M. Havinga,et al. Survey of Electronic Payment Methods and Systems , 1996 .
[82] M. Kubat,et al. Decision trees can initialize radial-basis function networks , 1998, IEEE Trans. Neural Networks.
[83] T. Sejnowski,et al. Practical Security in Public-Key Cryptography , 2002 .
[84] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[85] Martin P. Robillard,et al. Separating features in source code: an exploratory study , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[86] Bruce J. West,et al. Wavelet analysis of epileptic spikes. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[87] Yao-Hua Tan. A Trust Matrix Model for Electronic Commerce , 2003, iTrust.
[88] Jim Conallen,et al. Building Web applications with UML , 1999 .
[89] Roberto Togneri,et al. Speech recognition using the probabilistic neural network , 1998, ICSLP.
[90] L. Beran,et al. [Formal concept analysis]. , 1996, Casopis lekaru ceskych.
[91] Thomas W. Reps,et al. Identifying modules via concept analysis , 1997, 1997 Proceedings International Conference on Software Maintenance.
[92] R Biscay,et al. Multiresolution decomposition of non-stationary EEG signals: a preliminary study. , 1995, Computers in biology and medicine.
[93] J R Thompson,et al. Qualitative diagnostic calibration technique. , 1999, Journal of applied physiology.
[94] K. S. Norris,et al. a Theory for the Function of the Spermaceti Organ of the Sperm Whale (physeter Catodon L) , 1972 .
[95] Carlo Bellettini,et al. TestUml: user-metrics driven web applications testing , 2005, SAC '05.
[96] Gregor Kiczales,et al. Aspect-oriented programming , 2001, ESEC/FSE-9.
[97] C. Wientjes,et al. A comparison of three quantification methods for estimation of respiratory sinus arrhythmia. , 1990, Psychophysiology.
[98] Mark Soper,et al. Digital Cash Payment Systems , 1996 .
[99] Jean Louchet,et al. Mobile Robot Sensor Fusion Using Flies , 2003, EvoWorkshops.
[100] Michael Friedman,et al. Software Assessment: Reliability, Safety, Testability , 1995 .
[101] R. Stockton Gaines,et al. Some security principles and their application to computer security , 1978, OPSR.
[102] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[103] S. Mukhopadhyay,et al. A new interpretation of nonlinear energy operator and its efficacy in spike detection , 1998, IEEE Transactions on Biomedical Engineering.
[104] M A Sackner,et al. Measurement of breath amplitudes: Comparison of three noninvasive respiratory monitors to integrated pneumotachograph , 1993, Pediatric pulmonology.
[105] Tadayoshi Kohno,et al. Trust (and mistrust) in secure applications , 2001, CACM.
[106] I. Daubechies. Orthonormal bases of compactly supported wavelets , 1988 .
[107] Man Wai Mak,et al. Genetic evolution of radial basis function centers for pattern classification , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).
[108] Carlo Bellettini,et al. WebUml: reverse engineering of web applications , 2004, SAC '04.
[109] Stefanos Gritzalis,et al. A digital seal solution for deploying trust on commercial transactions , 2001, Inf. Manag. Comput. Secur..
[110] H. Huikuri,et al. Ectopic Beats in Heart Rate Variability Analysis: Effects of Editing on Time and Frequency Domain Measures , 2001, Annals of noninvasive electrocardiology : the official journal of the International Society for Holter and Noninvasive Electrocardiology, Inc.
[111] A. M. Reina,et al. Aspect-Oriented Web Development vs . Non Aspect-Oriented Web Development , 2003 .
[112] Giuseppe A. Di Lucca,et al. WARE: a tool for the reverse engineering of Web applications , 2002, Proceedings of the Sixth European Conference on Software Maintenance and Reengineering.
[113] Stanley M. Sutton,et al. N degrees of separation: multi-dimensional separation of concerns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[114] Stefano Ceri,et al. Web Modeling Language (WebML): a modeling language for designing Web sites , 2000, Comput. Networks.
[115] I. Tomek. An Experiment with the Edited Nearest-Neighbor Rule , 1976 .
[116] Ed Dawson,et al. Modelling Trust Structures for Public Key Infrastructures , 2002, ACISP.
[117] Dan Klein,et al. Evaluating strategies for similarity search on the web , 2002, WWW '02.
[118] Michael Bilitch,et al. North American Society of Pacing and Electrophysiology (NASPE) , 1979, Pacing and clinical electrophysiology : PACE.
[119] Eric R. Verheul,et al. Binding cryptography - A fraud-detectible alternative to Key-Escrow proposals , 1997, Comput. Law Secur. Rev..
[120] Dino Pedreschi,et al. ExAnte: Anticipated Data Reduction in Constrained Pattern Mining , 2003, PKDD.
[121] A. Porta,et al. Power spectrum analysis of heart rate variability to assess the changes in sympathovagal balance during graded orthostatic tilt. , 1994, Circulation.
[122] Rüdiger W. Brause,et al. Medical Analysis and Diagnosis by Neural Networks , 2001, ISMDA.
[123] Antonio F. Gómez-Skarmeta,et al. New security services based on PKI , 2003, Future Gener. Comput. Syst..
[124] Nathalie Japkowicz,et al. A Novelty Detection Approach to Classification , 1995, IJCAI.
[125] Audun Jøsang,et al. Technologies for Trust in Electronic Commerce , 2004, Electron. Commer. Res..
[126] David C. Yen,et al. Public key infrastructure: a micro and macro analysis , 2003, Comput. Stand. Interfaces.
[127] Tuomas Sandholm,et al. Contracting With Uncertain Level Of Trust , 1999, EC '99.
[128] Harris Drucker,et al. Comparison of learning algorithms for handwritten digit recognition , 1995 .
[129] Joel Weise-Sunps,et al. Public Key Infrastructure Overview , 2001 .
[130] Daniel Schwabe,et al. OOHDM-Web: an environment for implementation of hypermedia applications in the WWW , 1999, LINK.
[131] Jeff Tian,et al. Measuring and Modeling Usage and Reliability for Statistical Web Testing , 2001, IEEE Trans. Software Eng..
[132] Gregory Piatetsky-Shapiro,et al. The interestingness of deviations , 1994 .
[133] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[134] Sugato Basu and Raymond J. Mooney and Krupakar V. Pasupul Ghosh. Using Lexical Knowlege to Evaluate the Novelty of Rules Mined from Text , 2001 .
[135] Patrick Pérez,et al. Data fusion for visual tracking with particles , 2004, Proceedings of the IEEE.
[136] Raul Queiroz Feitosa,et al. Facial Expression Classification Using RBF AND Back-Propagation Neural Networks , 2000 .
[137] Sead Muftic,et al. A secure payment system for electronic commerce , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.
[138] C. Tracy,et al. ACC/AHA PRACTICE GUIDELINES ACC/AHA Guidelines for Ambulatory Electrocardiography , 1999 .
[139] Jean Louchet,et al. Using an Individual Evolution Strategy for Stereovision , 2001, Genetic Programming and Evolvable Machines.
[140] David A. Helweg,et al. Acoustic identification of female Steller sea lions , 2000 .
[141] Teuvo Kohonen,et al. Self-Organization and Associative Memory , 1988 .
[142] Wynne Hsu,et al. Using General Impressions to Analyze Discovered Classification Rules , 1997, KDD.
[143] Ulrich Parlitz,et al. Methods of chaos physics and their application to acoustics , 1988 .
[144] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..