Sciweavers

2503 search results - page 253 / 501
» New Algorithms for Statistical Analysis of Interval Data
Sort
View
IUI
2010
ACM
16 years 2 months ago
Temporal task footprinting: identifying routine tasks by their temporal patterns
This paper introduces a new representation for describing routine tasks, called temporal task footprints. Routines are characterized by their temporal regularity or rhythm. Tempor...
Oliver Brdiczka, Norman Makoto Su, James Bo Begole
IEEEARES
2010
IEEE
15 years 10 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
ICIP
2008
IEEE
15 years 12 months ago
Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema
Recently Zhang et al described an algorithm for the detection of ±1 LSB steganography based on the statistics of the amplitudes of local extrema in the greylevel histogram. Exper...
Giacomo Cancelli, Gwenaël J. Doërr, Inge...
ICRA
2010
IEEE
150views Robotics» more  ICRA 2010»
15 years 3 months ago
Consistency of the monocular EKF-SLAM algorithm for three different landmark parametrizations
We benchmark in this article three different landmark parametrizations in monocular 6DOF EKF-SLAM. These parametrizations are homogeneous points (HP), inversedistance points (IDP, ...
Joan Solà
APPROX
2008
Springer
71views Algorithms» more  APPROX 2008»
15 years 7 months ago
Tight Bounds for Hashing Block Sources
It is known that if a 2-universal hash function H is applied to elements of a block source (X1, . . . , XT ), where each item Xi has enough min-entropy conditioned on the previous...
Kai-Min Chung, Salil P. Vadhan