Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
TITB
2010
165views Education» more  TITB 2010»
10 years 6 months ago
On combining morphological component analysis and concentric morphology model for mammographic mass detection
Mammographic mass detection is an important task for the early diagnosis of breast cancer. However, it is difficult to distinguish masses from normal regions because of their abund...
Xinbo Gao, Ying Wang, Xuelong Li, Dacheng Tao
TIT
2010
124views Education» more  TIT 2010»
10 years 6 months ago
Soft-input soft-output single tree-search sphere decoding
Soft-input soft-output (SISO) detection algorithms form the basis for iterative decoding. The computational complexity of SISO detection often poses significant challenges for prac...
Christoph Studer, Helmut Bölcskei
TELSYS
2010
132views more  TELSYS 2010»
10 years 6 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
SIMULATION
2010
178views more  SIMULATION 2010»
10 years 6 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
SIGIR
2010
ACM
10 years 6 months ago
Efficient partial-duplicate detection based on sequence matching
With the ever-increasing growth of the Internet, numerous copies of documents become serious problem for search engine, opinion mining and many other web applications. Since parti...
Qi Zhang, Yue Zhang, Haomin Yu, Xuanjing Huang
JIPS
2010
195views more  JIPS 2010»
10 years 6 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
JDCTA
2010
188views more  JDCTA 2010»
10 years 6 months ago
Compressive Sensing Signal Detection Algorithm Based on Location Information of Sparse Coefficients
Without reconstructing the signal themselves, signal detection could be solved by detection algorithm, which directly processes sampling value obtained from compressive sensing si...
Bing Liu, Ping Fu, Shengwei Meng, Lunping Guo
JCIT
2010
161views more  JCIT 2010»
10 years 6 months ago
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching
With the development of high-speed network technique and increasing volume of network traffic, traditional pattern matching method can't adapt to the new challenges to intrus...
Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao
ICASSP
2010
IEEE
10 years 6 months ago
Physical layer algorithm and hardware verification of MIMO relays using cooperative partial detection
Cooperative communication with multi-antenna relays can significantly increase the reliability and speed. However, cooperative MIMO detection would impose considerable complexity o...
Kiarash Amiri, Michael Wu, Melissa Duarte, Joseph ...
EVI
2010
156views more  EVI 2010»
10 years 6 months ago
GPU implementation of a road sign detector based on particle swarm optimization
Road Sign Detection is a major goal of the Advanced Driving Assistance Systems. Most published work on this problem share the same approach by which signs are first detected and th...
Luca Mussi, Stefano Cagnoni, Elena Cardarelli, Fab...
books