Sciweavers

667 search results - page 80 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
TOCS
1998
209views more  TOCS 1998»
14 years 11 months ago
UFO: A Personal Global File System Based on User-Level Extensions to the Operating System
ile system abstractions, they all require either changes to the operating system or modifications to standard libraries. The article gives a detailed performance analysis of our ap...
Albert Alexandrov, Maximilian Ibel, Klaus E. Schau...
ACCV
2010
Springer
14 years 8 months ago
Stream-based Active Unusual Event Detection
We present a new active learning approach to incorporate human feedback for on-line unusual event detection. In contrast to most existing unsupervised methods that perform passiv...
Chen Change Loy, Tao Xiang, Shaogang Gong
VTC
2006
IEEE
199views Communications» more  VTC 2006»
15 years 5 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
CCS
2003
ACM
15 years 5 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
BMCBI
2010
179views more  BMCBI 2010»
14 years 6 months ago
Circadian signatures in rat liver: from gene expression to pathways
Background: Circadian rhythms are 24 hour oscillations in many behavioural, physiological, cellular and molecular processes that are controlled by an endogenous clock which is ent...
Meric A. Ovacik, Siddharth Sukumaran, Richard R. A...