Sciweavers

1865 search results - page 340 / 373
» Pan-Private Streaming Algorithms
Sort
View
100
Voted
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
15 years 10 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
ICAC
2009
IEEE
15 years 10 months ago
Out-of-band detection of boot-sequence termination events
The popularization of both virtualization and CDP technologies mean that we can now watch disk accesses of systems from entities which are not controlled by the OS. This is a rich...
Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula T...
152
Voted
ICASSP
2009
IEEE
15 years 10 months ago
Delay-based overlay construction in P2P video broadcast
We consider streaming video content over an overlay network of peer nodes. Each of the nodes employs a mesh-pull mechanism to organize the download of data units from its neighbou...
Jacob Chakareski, Pascal Frossard
225
Voted
ICC
2009
IEEE
130views Communications» more  ICC 2009»
15 years 10 months ago
A New Reduced Complexity ML Detection Scheme for MIMO Systems
Abstract— For multiple-input multiple-output (MIMO) systems, the optimum maximum likelihood (ML) detection requires tremendous complexity as the number of antennas or modulation ...
Jin-Sung Kim, Sung Hyun Moon, Inkyu Lee
125
Voted
IEEEPACT
2009
IEEE
15 years 10 months ago
Analytical Modeling of Pipeline Parallelism
Parallel programming is a requirement in the multi-core era. One of the most promising techniques to make parallel programming available for the general users is the use of parall...
Angeles G. Navarro, Rafael Asenjo, Siham Tabik, Ca...