Sciweavers

23988 search results - page 4557 / 4798
» Social Network Computing
Sort
View
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 9 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...
AINA
2009
IEEE
15 years 9 months ago
Layer-Based Dome Contents Creation Using Scenario Description Language
—In recent years, dome display has become popular, and it is desired to establish a method to create dome image contents easily. In this study, psychophysical experiment was cond...
Tetsuro Ogi, Daisuke Furuyama, Tetsuro Fujise
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
15 years 9 months ago
The Kalman like particle filter: Optimal estimation with quantized innovations/measurements
— We study the problem of optimal estimation using quantized innovations, with application to distributed estimation over sensor networks. We show that the state probability dens...
Ravi Teja Sukhavasi, Babak Hassibi
IWCMC
2009
ACM
15 years 9 months ago
Cross-layer resource allocation scheme for multi-band high rate UWB systems
Abstract- In this paper, we investigate the use of a crosslayer allocation mechanism for the high-rate ultra-wideband (UWB) systems. The aim of this paper is twofold. First, throug...
Ayman Khalil, Matthieu Crussière, Jean-Fran...
MOBIDE
2009
ACM
15 years 9 months ago
Data-aware connectivity in mobile replicated systems
Optimistic replication is a fundamental technique for supporting concurrent work practices in mobile environments. However, due to sudden and frequent transitions to weakly connec...
João Pedro Barreto, João Garcia, Lu&...
« Prev « First page 4557 / 4798 Last » Next »