Sciweavers

10061 search results - page 1631 / 2013
» Statistical Models of Conditioning
Sort
View
WETICE
2009
IEEE
15 years 11 months ago
BitTorrent or BitCrunch: Evidence of a Credit Squeeze in BitTorrent?
Abstract—BitTorrent is a highly popular peer-to-peer filesharing protocol. Much BitTorrent activity takes place within private virtual communities called “Private Trackers” ...
David Hales, Rameez Rahman, Boxun Zhang, Michel Me...
ICDM
2009
IEEE
155views Data Mining» more  ICDM 2009»
15 years 11 months ago
Stacked Gaussian Process Learning
—Triggered by a market relevant application that involves making joint predictions of pedestrian and public transit flows in urban areas, we address the question of how to utili...
Marion Neumann, Kristian Kersting, Zhao Xu, Daniel...
ICST
2009
IEEE
15 years 11 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
159
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
IROS
2009
IEEE
115views Robotics» more  IROS 2009»
15 years 11 months ago
Intermittency of slow arm movements increases in distal direction
— When analyzed in the tangential speed domain, human movements exhibit a multi-peaked speed profile which is commonly interpreted as evidence for submovements. At slow speeds, ...
Ozkan Celik, Qin Gu, Zhigang Deng, Marcia Kilchenm...
« Prev « First page 1631 / 2013 Last » Next »