Sciweavers

65 search results - page 2 / 13
» isi 2007
Sort
View
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 4 months ago
Graph-Based Decoding in the Presence of ISI
We propose a new graph representation for ISI channels that can be used for combined equalization and decoding by linear programming (LP) or iterative message-passing (IMP) decodi...
Mohammad H. Taghavi, Paul H. Siegel
BC
2005
63views more  BC 2005»
13 years 4 months ago
Detecting chaotic structures in noisy pulse trains based on interspike interval reconstruction
The nonlinear prediction method based on the interspike interval (ISI) reconstruction is applied to the ISI sequence of noisy pulse trains and the detection of the deterministic st...
Takashi Kanamaru, Masatoshi Sekine
VIZSEC
2007
Springer
13 years 11 months ago
Visual Analysis of Network Flow Data with Timelines and Event Plots
This paper describes Isis, a system that uses progressive multiples of timelines and event plots to support the iterative investigation of intrusions by experienced analysts using ...
Doantam Phan, J. Gerth, M. Lee, Andreas Paepcke, T...
ISI
2007
Springer
13 years 11 months ago
Managing Security Threats and Vulnerabilities for Small to Medium Enterprises
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
Cyril Onwubiko, Andrew P. Lenaghan
ISI
2007
Springer
13 years 4 months ago
Privacy Preserving Collaborative Data Mining
Privacy-preserving data mining is an important issue in the areas of data mining and security. In this paper, we study how to conduct association rule mining, one of the core data...
Justin Z. Zhan