Sciweavers

2032 search results - page 342 / 407
» Crime Pattern Detection Using Data Mining
Sort
View
MOBISYS
2008
ACM
15 years 9 months ago
Detecting energy-greedy anomalies and mobile malware variants
Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the...
Hahnsang Kim, Joshua Smith, Kang G. Shin
VLDB
1998
ACM
105views Database» more  VLDB 1998»
15 years 1 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...
INFOCOM
2009
IEEE
15 years 4 months ago
TCP/IP Timing Channels: Theory to Implementation
—There has been significant recent interest in covert communication using timing channels. In network timing channels, information is leaked by controlling the time between tran...
Sarah H. Sellke, Chih-Chun Wang, Saurabh Bagchi, N...
ECCV
2006
Springer
15 years 1 months ago
Comparing Ensembles of Learners: Detecting Prostate Cancer from High Resolution MRI
While learning ensembles have been widely used for various pattern recognition tasks, surprisingly, they have found limited application in problems related to medical image analysi...
Anant Madabhushi, Jianbo Shi, Michael D. Feldman, ...
EMNETS
2007
15 years 1 months ago
Sensor node localisation using a stereo camera rig
In this paper, we use stereo vision processing techniques to detect and localise sensors used for monitoring simulated environmental events within an experimental sensor network t...
Dermot Diamond, Noel E. O'Connor, Alan F. Smeaton,...