Sciweavers

1509 search results - page 163 / 302
» Building Shape Models from Lousy Data
Sort
View
KDD
2004
ACM
285views Data Mining» more  KDD 2004»
15 years 9 months ago
Effective localized regression for damage detection in large complex mechanical structures
In this paper, we propose a novel data mining technique for the efficient damage detection within the large-scale complex mechanical structures. Every mechanical structure is defi...
Aleksandar Lazarevic, Ramdev Kanapady, Chandrika K...
APNOMS
2006
Springer
15 years 8 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
TON
2008
102views more  TON 2008»
15 years 4 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
IGARSS
2009
15 years 2 months ago
Modeling Surface-flow Characteristics in Glaciated Landscapes
The Prairie Pothole Region (PPR) of the US and Canada is characterized by thousands of shallow, water-filled depressions with sizes ranging from a fraction of a hectare to several...
Janet Gritzner
LOCA
2005
Springer
15 years 10 months ago
Web-Enhanced GPS
Location-based services like reminders, electronic graffiti, and tourist guides normally require a custom, location-sensitive database that must be custom-tailored for the applicat...
Ramaswamy Hariharan, John Krumm, Eric Horvitz