Sciweavers

304 search results - page 39 / 61
» From the multiple frequency tracker to the multiple frequenc...
Sort
View
ICDCS
2008
IEEE
15 years 6 months ago
Analysis of Maximum Executable Length for Detecting Text-Based Malware
The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
P. Kumar Manna, Sanjay Ranka, Shigang Chen
DIS
2001
Springer
15 years 4 months ago
Eliminating Useless Parts in Semi-structured Documents Using Alternation Counts
We propose a preprocessing method for Web mining which, given semi-structured documents with the same structure and style, distinguishes useless parts and non-useless parts in each...
Daisuke Ikeda, Yasuhiro Yamada, Sachio Hirokawa
ICA
2004
Springer
15 years 5 months ago
Exploiting Spatiotemporal Information for Blind Atrial Activity Extraction in Atrial Arrhythmias
The analysis and characterization of atrial tachyarrhythmias requires the previous estimation of the atrial activity (AA) free from any ventricular activity and other artefacts. Th...
Francisco Castells, Jorge Igual, Vicente Zarzoso, ...
RECOMB
2010
Springer
15 years 3 months ago
MoGUL: Detecting Common Insertions and Deletions in a Population
Abstract. While the discovery of structural variants in the human population is ongoing, most methods for this task assume that the genome is sequenced to high coverage (e.g. 40x),...
Seunghak Lee, Eric Xing, Michael Brudno
ICASSP
2010
IEEE
14 years 12 months ago
Multipoint-to-point and point-to-multipoint space-time network coding
Traditional cooperative communications can improve communication reliability. However, the simultaneous transmissions from multiple relays are challenging in practice due to the i...
Hung-Quoc Lai, K. J. Ray Liu