Sciweavers

ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Normalized Double-Talk Detection Based on Microphone and AEC Error Cross-Correlation
In this paper, we present two different double-talk detection schemes for Acoustic Echo Cancellation (AEC). First, we present a novel normalized detection statistic based on the c...
Asif Iqbal Mohammad, Jack W. Stokes, Steven L. Gra...
IAT
2007
IEEE
13 years 11 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
VTC
2008
IEEE
236views Communications» more  VTC 2008»
13 years 11 months ago
Apriori-LLR-Threshold-Assisted K-Best Sphere Detection for MIMO Channels
—When the maximum number of best candidates retained at each tree search level of the K-Best Sphere Detection (SD) is kept low for the sake of maintaining a low memory requiremen...
Li Wang, Lei Xu, Sheng Chen, Lajos Hanzo
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
13 years 11 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
ICPR
2008
IEEE
13 years 11 months ago
Human detection by searching in 3d space using camera and scene knowledge
Many existing human detection systems are based on sub-window classification, namely detection is done by enumerating rectangular sub-images in the 2D image space. Detection rate...
Yuan Li, Bo Wu, Ram Nevatia
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
13 years 11 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
GLOBECOM
2008
IEEE
13 years 11 months ago
Opportunity Detection for OFDMA Systems with Timing Misalignment
— Accurate detection of spectrum opportunities within the frequency band of an orthogonal frequency division multiple access (OFDMA) system is a critical requirement for the real...
Mustafa E. Sahin, Ismail Güvenç, Moo-R...
CSMR
2008
IEEE
13 years 11 months ago
Visual Detection of Design Anomalies
Design anomalies, introduced during software evolution, are frequent causes of low maintainability and low flexibility to future changes. Because of the required knowledge, an im...
Karim Dhambri, Houari A. Sahraoui, Pierre Poulin
NANONET
2009
Springer
152views Chemistry» more  NANONET 2009»
13 years 11 months ago
Quantum Dots and Wires to Improve Enzymes-Based Electrochemical Bio-sensing
An investigation on nano-structured electrodes to detect different metabolites is proposed in this paper. Three different metabolites are considered: glucose, lactate, and choleste...
Sandro Carrara, Cristina Boero, Giovanni De Michel...
QSIC
2009
IEEE
13 years 11 months ago
A Bayesian Approach for the Detection of Code and Design Smells
The presence of code and design smells can have a severe impact on the quality of a program. Consequently, their detection and correction have drawn the attention of both research...
Foutse Khomh, Stéphane Vaucher, Yann-Ga&eum...