Sciweavers

4616 search results - page 340 / 924
» Extreme Components Analysis
Sort
View
CN
1999
115views more  CN 1999»
15 years 4 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
ICDM
2010
IEEE
101views Data Mining» more  ICDM 2010»
15 years 2 months ago
Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems
A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system that re...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Chi...
147
Voted
HCI
2009
15 years 2 months ago
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data
Due to its convenient, low physical restraint, and electric noise tolerant features, functional near-infrared spectroscopy (fNIRS) is expected to be a useful tool in monitoring use...
Takayuki Nozawa, Toshiyuki Kondo
ACL
2012
13 years 7 months ago
Historical Analysis of Legal Opinions with a Sparse Mixed-Effects Latent Variable Model
We propose a latent variable model to enhance historical analysis of large corpora. This work extends prior work in topic modelling by incorporating metadata, and the interactions...
William Yang Wang, Elijah Mayfield, Suresh Naidu, ...

Publication
767views
17 years 3 months ago
Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in Computer Networks
Congestion avoidance mechanisms allow a network to operate in the optimal region of low delay and high throughput, thereby, preventing the network from becoming congested. This is ...
D. Chiu and R. Jain