Sciweavers

1486 search results - page 134 / 298
» Firewall Rules Analysis
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Maximum Likelihood Detection and Optimal Code Design for Differential Unitary Space-Time Modulation with Carrier Frequency Offse
Abstract— In this paper, we answer the question that “Can conventional differential unitary space time modulation (DUSTM) be applied when there is an unknown carrier frequency ...
Tao Cui, Feifei Gao, Arumugam Nallanathan, Chintha...
AUSDM
2007
Springer
84views Data Mining» more  AUSDM 2007»
15 years 10 months ago
Detecting Anomalous Longitudinal Associations Through Higher Order Mining
The detection of unusual or anomalous data is an important function in automated data analysis or data mining. However, the diversity of anomaly detection algorithms shows that it...
Ping Liang, John F. Roddick
AXMEDIS
2006
IEEE
231views Multimedia» more  AXMEDIS 2006»
15 years 10 months ago
A Feature-Augmented Grammar for Automated Media Production
The IST Polymnia project aims to create a fully automated system for personalised video generation. Film production involves content creation, selection and composition. Technolog...
Freddy Choi, Richard Beales, Jonathan Hearn, Stuar...
KBSE
2006
IEEE
15 years 10 months ago
Automated Reasoning on Aspects Interactions
The aspect-oriented paradigm allows weaving aspects in different join points of a program. Aspects can modify object fields and method control flow, thus possibly introducing subt...
Paolo Falcarin, Marco Torchiano
ICCS
2004
Springer
15 years 9 months ago
Iceberg Query Lattices for Datalog
In this paper we study two orthogonal extensions of the classical data mining problem of mining association rules, and show how they naturally interact. The first is the extension...
Gerd Stumme