Sciweavers

3707 search results - page 117 / 742
» A Simple Technique for Self-Calibration
Sort
View
WWW
2011
ACM
14 years 5 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
TASLP
2010
134views more  TASLP 2010»
14 years 4 months ago
Autoregressive Models of Amplitude Modulations in Audio Compression
We present a scalable medium bit-rate wide-band audio coding technique based on frequency domain linear prediction (FDLP). FDLP is an efficient method for representing the long-ter...
Sriram Ganapathy, Petr Motlícek, Hynek Herm...
TCSV
2010
14 years 4 months ago
Video Foreground Detection Based on Symmetric Alpha-Stable Mixture Models
Background subtraction (BS) is an efficient technique for detecting moving objects in video sequences. A simple BS process involves building a model of the background and extractin...
Harish Bhaskar, Lyudmila Mihaylova, Alin Achim
ICASSP
2011
IEEE
14 years 1 months ago
Investigations into the incorporation of the Ideal Binary Mask in ASR
While much work has been dedicated to exploring how best to incorporate the Ideal Binary Mask (IBM) in automatic speech recognition (ASR) for noisy signals, we demonstrate that th...
William Hartmann, Eric Fosler-Lussier
INFOCOM
2012
IEEE
13 years 17 days ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...