Fig 2 - uploaded by Cédric Duchêne
Content may be subject to copyright.
Behavior of the suboptimal detector (4)-(5) under the different optimization criteria, versus the stability index α, for c = 0.1: same legend as for the previous figure; the solid line with stars represents the probability of error of the optimal detector.  

Behavior of the suboptimal detector (4)-(5) under the different optimization criteria, versus the stability index α, for c = 0.1: same legend as for the previous figure; the solid line with stars represents the probability of error of the optimal detector.  

Source publication
Article
Full-text available
This paper deals with the suboptimal detection of a constant signal corrupted by additive α-stable white noise. We recall in this paper why the optimal and locally optimal detectors cannot be implemented in the α-stable context. Hence, we focus our attention on a paramet-ric suboptimal detector which shares some properties with the locally optimal...

Similar publications

Article
Full-text available
We study the problem of Perfectly Reliable Message Transmission (PRMT) and Perfectly Secure Message Transmission (PSMT) between two nodes S and R in an undirected synchronous network, a part of which is under the in∞uence of an all powerful mobile Byzantine adversary. In ACISP'2007 Srinathan et. al. has proved that the connectivity requirement for...
Article
Full-text available
Scholars of governance reforms in developing countries often argue that the surest way to address corruption, cronyism, inefficiency, and red tape is swift, dramatic change enacted by political leaders during moments of upheaval (i.e., “powering” reforms). This research finds that a very different type of change is not only possible but also more e...
Chapter
Full-text available
Like intergroup violence (Chap. 7) and insurgency (Chap. 8), crime and ­corruption are nearly inevitable companions of an international intervention. Both contribute to the reasons why the intervention occurs, and both may even grow and fester as side-effects of an intervention. Moreover, crime and corruption frequently serve as obstacles to a succ...
Conference Paper
Full-text available
In order to handle speech signals corrupted by noise in speaker verification and provide robustness to systems, this paper evaluates the use of missing feature (MF) approach with a novel combination of techniques. A mask estimation based on spectral subtraction is used to determine the reliability of spectral components in a speech signal corrupted...
Article
Full-text available
We present a formulation of deep learning that aims at producing a large margin classifier. The notion of margin, minimum distance to a decision boundary, has served as the foundation of several theoretically profound and empirically successful results for both classification and regression tasks. However, most large margin algorithms are applicabl...