Sciweavers

6329 search results - page 219 / 1266
» Detection of Stochastic Processes
Sort
View
AIR
2004
131views more  AIR 2004»
15 years 4 months ago
A Survey of Outlier Detection Methodologies
Abstract. Outlier detection has been used for centuries to detect and, where appropriate, remove anomalous observations from data. Outliers arise due to mechanical faults, changes ...
Victoria J. Hodge, Jim Austin
ICIP
2005
IEEE
16 years 6 months ago
Redundant-wavelet watermarking with pixel-wise masking
An algorithm is presented which implements image watermarking in the domain of an overcomplete, or redundant, wavelet transform. This algorithm expands on a previous method which ...
Kristen M. Parker, James E. Fowler
ICCSA
2004
Springer
15 years 9 months ago
DDoS Attack Defense Architecture Using Active Network Technology
To solve the congestion problem, network nodes at near the zombies need to filter the attack traffic. But the amounts of attack packets are small at upstream node and it is hard t...
Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee
ICASSP
2011
IEEE
14 years 8 months ago
Cooperative sensing with sequential ordered transmissions to secondary fusion center
Successful spectrum sharing in a cognitive radio network depends on the correct and quick detection of primary activity. Cooperative spectrum sensing is therefore suggested to enh...
Laila Hesham, Ahmed Sultan, Mohammed Nafie, Fadel ...
ACSAC
2008
IEEE
15 years 11 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...