Sciweavers

1086 search results - page 115 / 218
» Points surrounding the origin
Sort
View
ESANN
2006
15 years 2 months ago
LS-SVM functional network for time series prediction
Usually time series prediction is done with regularly sampled data. In practice, however, the data available may be irregularly sampled. In this case the conventional prediction me...
Tuomas Kärnä, Fabrice Rossi, Amaury Lend...
AUSFORENSICS
2003
15 years 2 months ago
Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Atif Ahmad, Tobias Ruighaver
DGO
2003
86views Education» more  DGO 2003»
15 years 2 months ago
The role of a search agent for disenfranchised users
Connected Kids project is about developing a searchable database system for the disenfranchised people of the city of Troy, New York. The various events and programs for the young...
Mousumi Chatterjee, Sibel Adali
IC
2003
15 years 2 months ago
Denying Denial-of-Service Attacks: A Router Based Solution
Distributed Denial-of-Service (DDoS) attacks prevent users from accessing services on the target network by flooding the target network with a large volume of traffic. In this pap...
Zhang Shu, Partha Dasgupta
SODA
2004
ACM
151views Algorithms» more  SODA 2004»
15 years 2 months ago
Minimum moment Steiner trees
For a rectilinear Steiner tree T with a root, define its k-th moment Mk(T) = T (dT (u))k du, where the integration is over all edges of T, dT (u) is the length of the unique path ...
Wangqi Qiu, Weiping Shi