Sciweavers

7623 search results - page 269 / 1525
» Constructive Volume Modeling
Sort
View
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 4 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
MICCAI
2009
Springer
16 years 1 months ago
Joint Segmentation of Image Ensembles via Latent Atlases
Abstract. Spatial priors, such as probabilistic atlases, play an important role in MRI segmentation. However, the availability of comprehensive, reliable and suitable manual segmen...
Tammy Riklin Raviv, Koen Van Leemput, William M. W...
ISICA
2009
Springer
15 years 10 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
DATE
2008
IEEE
226views Hardware» more  DATE 2008»
15 years 10 months ago
A General Method to Evaluate RF BIST Techniques Based on Non-parametric Density Estimation
Abstract— We present a general method to evaluate RF BuiltIn Self-Test (BIST) techniques during the design stage. In particular, the adaptive kernel estimator is used to construc...
Haralampos-G. D. Stratigopoulos, Jeanne Tongbong, ...
ICDCSW
2007
IEEE
15 years 10 months ago
A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems
Free-riders and fake files are two important problems in P2P file sharing systems. Previous works have always used incentive mechanisms and trust mechanisms to address them resp...
Mao Yang, Qinyuan Feng, Yafei Dai, Zheng Zhang