Sciweavers

92 search results - page 2 / 19
» Distributed Estimation and False Data Detection with Applica...
Sort
View
WEBI
2009
Springer
13 years 11 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
SEBD
2007
164views Database» more  SEBD 2007»
13 years 6 months ago
Online Distribution Estimation for Streaming Data: Framework and Applications
In the last few years, we have been witnessing an evergrowing need for continuous observation and monitoring applications. This need is driven by recent technological advances that...
Themis Palpanas, Vana Kalogeraki, Dimitrios Gunopu...
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
13 years 8 months ago
Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Using Radial Sweep Methodology
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Michael E. Schuckers, Yordan Minev, Andy Adler
PERCOM
2007
ACM
14 years 4 months ago
Macro Programming through Bayesian Networks: Distributed Inference and Anomaly Detection
Macro programming a distributed system, such as a sensor network, is the ability to specify application tasks at a global level while relying on compiler-like software to translat...
Marco Mamei, Radhika Nagpal
ICRA
2008
IEEE
149views Robotics» more  ICRA 2008»
13 years 11 months ago
Target detection and position likelihood using an aerial image sensor
— Sensor-based control is an emerging challenge in UAV applications. It is essential in a sensing task to account for sensor measurement errors when computing a target position e...
Zu Whan Kim, Raja Sengupta