Sciweavers

58 search results - page 6 / 12
» Exploiting Sparse User Activity in Multiuser Detection
Sort
View
CIKM
2005
Springer
15 years 3 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
WWW
2008
ACM
15 years 10 months ago
Computable social patterns from sparse sensor data
We present a computational framework to automatically discover high-order temporal social patterns from very noisy and sparse location data. We introduce the concept of social foo...
Dinh Q. Phung, Brett Adams, Svetha Venkatesh
MICCAI
2009
Springer
15 years 10 months ago
Functional Segmentation of fMRI Data Using Adaptive Non-negative Sparse PCA (ANSPCA)
We propose a novel method for functional segmentation of fMRI data that incorporates multiple functional attributes such as activation effects and functional connectivity, under a ...
Bernard Ng, Rafeef Abugharbieh, Martin J. McKeow...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 3 months ago
Quality of Service in Wireless Network Diversity Multiple Access Protocols Based on a Virtual Time-Slot Allocation
— In this paper, we propose a new resource allocation mechanism which is designed to improve the multiuser detection of wireless network diversity multiple access (NDMA) protocol...
Ramiro Samano-Robles, Mounir Ghogho, Desmond C. Mc...
EUROSYS
2008
ACM
15 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos