Sciweavers

7952 search results - page 1456 / 1591
» Methods for Measuring Usability
Sort
View
114
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
CEC
2007
IEEE
15 years 10 months ago
MRI brain image segmentation by fuzzy symmetry based genetic clustering technique
—In this paper, an automatic segmentation technique of multispectral magnetic resonance image of the brain using a new fuzzy point symmetry based genetic clustering technique is ...
Sriparna Saha, Sanghamitra Bandyopadhyay
161
Voted
IJCNN
2007
IEEE
15 years 10 months ago
Generalised Kernel Machines
Abstract— The generalised linear model (GLM) is the standard approach in classical statistics for regression tasks where it is appropriate to measure the data misfit using a lik...
Gavin C. Cawley, Gareth J. Janacek, Nicola L. C. T...
134
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
—The implementation of distributed network utility maximization (NUM) algorithms hinges heavily on information feedback through message passing among network elements. In practic...
Junshan Zhang, Dong Zheng, Mung Chiang
INFOCOM
2007
IEEE
15 years 10 months ago
Detection and Localization of Network Black Holes
— Internet backbone networks are under constant flux, struggling to keep up with increasing demand. The pace of technology change often outstrips the deployment of associated fa...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
« Prev « First page 1456 / 1591 Last » Next »