Sciweavers

8177 search results - page 373 / 1636
» Detecting System Emulators
Sort
View
IJBIDM
2010
80views more  IJBIDM 2010»
15 years 2 months ago
Practical algorithms for subgroup detection in covert networks
: In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrat...
Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qure...
VTC
2010
IEEE
145views Communications» more  VTC 2010»
15 years 2 months ago
Ant-Colony Based Near-ML Space-Time Multiuser Detection for the STBC Assisted DS-CDMA Uplink
— In this contribution, a novel Ant Colony Optimization (ACO) based Space-Time (ST) Multiuser Detection (MUD) algorithm was proposed in order to improve the Bit Error Ratio (BER)...
Chong Xu, Lie-Liang Yang, Lajos Hanzo
EDM
2009
175views Data Mining» more  EDM 2009»
15 years 1 months ago
Detecting Symptoms of Low Performance Using Production Rules
E-Learning systems offer students innovative and attractive ways of learning through augmentation or substitution of traditional lectures and exercises with online learning materia...
Javier Bravo Agapito, Alvaro Ortigosa
ICASSP
2011
IEEE
14 years 7 months ago
MIMO radar diversity with Neyman-Pearson signal detection in non-Gaussian circumstance with non-orthogonal waveforms
The diversity gain of a multiple-input multiple-output (MIMO) system adopting the Neyman-Pearson (NP) criterion is derived for a signal-present versus signal-absent scalar hypothe...
Qian He, Rick S. Blum
SIGCOMM
2012
ACM
13 years 6 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...