Sciweavers

1263 search results - page 174 / 253
» An objective approach to cluster validation
Sort
View
TRIDENTCOM
2005
IEEE
15 years 3 months ago
Integrated Network Experimentation using Simulation and Emulation
Discrete-event packet-level network simulation is well-known and widely used. Network emulation is a hybrid approach that combines real elements of a deployed networked applicatio...
Shashi Guruprasad, Robert Ricci, Jay Lepreau
88
Voted
IH
2001
Springer
15 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
85
Voted
TMI
2008
136views more  TMI 2008»
14 years 10 months ago
Classification of fMRI Time Series in a Low-Dimensional Subspace With a Spatial Prior
We propose a new method for detecting activation in functional magnetic resonance imaging (fMRI) data. We project the fMRI time series on a low-dimensional subspace spanned by wave...
François G. Meyer, Xilin Shen
ICCV
2009
IEEE
16 years 3 months ago
Wide-Baseline Image Matching Using Line Signatures
We present a wide-baseline image matching approach based on line segments. Line segments are clustered into local groups according to spatial proximity. Each group is treated as...
Lu Wang, Ulrich Neumann and Suya You
120
Voted
ICDCS
2011
IEEE
13 years 9 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu