Sciweavers

839 search results - page 132 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
JVM
2001
99views Education» more  JVM 2001»
15 years 2 months ago
JVM Susceptibility to Memory Errors
Modern computer systems are becoming more powerful and are using larger memories. However, except for very high end systems, little attention is being paid to high availability. T...
DeQing Chen, Alan Messer, Philippe Bernadat, Guang...
126
Voted
CVPR
2009
IEEE
15 years 4 months ago
Efficiently training a better visual detector with sparse eigenvectors
Face detection plays an important role in many vision applications. Since Viola and Jones [1] proposed the first real-time AdaBoost based object detection system, much effort has ...
Sakrapee Paisitkriangkrai, Chunhua Shen, Jian Zhan...
94
Voted
ICC
2007
IEEE
15 years 7 months ago
Diversity Coherent Receivers for Optical Communication over the Clear Turbulent Atmosphere
—Optical communication through the atmosphere possibly enables high data rate communication. However, the optical field undergoes fades or outages due to air turbulence. Spatial ...
Etty J. Lee, Vincent W. S. Chan
110
Voted
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 1 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
ICIP
2008
IEEE
16 years 2 months ago
Adaptive decoding for halftone orientation-based data hiding
Halftone image watermarking techniques that allow automated extraction of the embedded watermark data are useful in a variety of document security and workflow applications. The p...
Orhan Bulan, Gaurav Sharma, Vishal Monga