Sciweavers

2056 search results - page 304 / 412
» Detecting Errors in Spreadsheets
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
14 years 9 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
TIT
2002
64views more  TIT 2002»
14 years 9 months ago
Performance of blind and group-blind multiuser detectors
Abstract--In blind and group-blind multiuser detection, different detectors can be designed using either the sample data covariance matrix directly or its eigencomponents. Due to f...
Anders Høst-Madsen, Xiaodong Wang
MVA
2007
179views Computer Vision» more  MVA 2007»
14 years 9 months ago
Multi-object trajectory tracking
The majority of existing tracking algorithms are based on the maximum a posteriori (MAP) solution of a probabilistic framework using a Hidden Markov Model, where the distribution ...
Mei Han, Wei Xu, Hai Tao, Yihong Gong
PVLDB
2008
111views more  PVLDB 2008»
14 years 9 months ago
Semandaq: a data quality system based on conditional functional dependencies
We present SEMANDAQ, a prototype system for improving the quality of relational data. Based on the recently proposed conditional functional dependencies (CFDs), it detects and rep...
Wenfei Fan, Floris Geerts, Xibei Jia
INFOCOM
2010
IEEE
14 years 8 months ago
Beyond Triangle Inequality: Sifting Noisy and Outlier Distance Measurements for Localization
—Knowing accurate positions of nodes in wireless ad-hoc and sensor networks is essential for a wide range of pervasive and mobile applications. However, errors are inevitable in ...
Lirong Jian, Zheng Yang, Yunhao Liu