#### Filter Results:

- Full text PDF available (11)

#### Publication Year

1996

2007

- This year (0)
- Last 5 years (0)
- Last 10 years (0)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

Masqueraders in computer intrusion detection are people who use somebody elseâ€™s computer account. We investigate a number of statistical approaches for detecting masqueraders. To evaluate them, weâ€¦ (More)

- Yehuda Vardi, Chunhui Zhang
- Proceedings of the National Academy of Sciencesâ€¦
- 2000

This paper gives three related results: (i) a new, simple, fast, monotonically converging algorithm for deriving the L1-median of a data cloud in Rd, a problem that can be traced to Fermat and hasâ€¦ (More)

- Yehuda Vardi, Cun-Hui Zhang
- Math. Program.
- 2001

This paper gives a new, simple, monotonically convergent, algorithm for the Fermat-Weber location problem, with extensions covering more general cost functions.

- Ofer Melnik, Yehuda Vardi, Cun-Hui Zhang
- IEEE Transactions on Pattern Analysis and Machineâ€¦
- 2004

Classifier combination holds the potential of improving performance by combining the results of multiple classifiers. For domains with very large numbers of classes, such as biometrics, we present anâ€¦ (More)

- Yehuda Vardi
- 2002

The microarray image technology is a new and powerful tool for studying the expression of thousands of genes simultaneously Methods for im age processing and statistical analysis are still underâ€¦ (More)

- Yehuda Vardi
- 2002

We present a robust clustering method based on a modi edWeiszfeld algorithm for the multivariate median and associated data depth The multi variate medians are used to represent the clusters whileâ€¦ (More)

- Jeffrey E. Boyd, Jean Meloche, Yehuda Vardi
- ICCV
- 1999

Applications that interpret video data need to track objects as they move in a scene. Tracking methods that estimate the state trajectories of objects as they change over time (e.g. Kalman filter)â€¦ (More)

- P. Jonathon Phillips, Yehuda Vardi
- Pattern Recognition Letters
- 1996

This paper presents a simple method for normalizing non-linear illumination variations in facial images. Facial pixels are modelled by an empirical probability distribution, which is estimated byâ€¦ (More)

- Yehuda Vardi, Cun-Hui Zhang
- IEEE Signal Processing Letters
- 2007

We propose measures of network vulnerability and study some of their properties. We define a network as a triplet (G,R,F), where G is the graph of the network, R is the routing protocol specifyingâ€¦ (More)

- Yehuda Vardi, D. Lee
- Int. J. Imaging Systems and Technology
- 1998