Sciweavers

1461 search results - page 194 / 293
» The fuzzy approach to statistical analysis
Sort
View
83
Voted
MOBICOM
2004
ACM
15 years 6 months ago
Characterizing flows in large wireless data networks
Several studies have recently been performed on wireless university campus networks, corporate and public networks. Yet little is known about the flow-level characterization in s...
Xiaoqiao Meng, Starsky H. Y. Wong, Yuan Yuan, Song...
103
Voted
ICIAR
2004
Springer
15 years 6 months ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
102
Voted
RAID
2000
Springer
15 years 4 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
85
Voted
SDM
2007
SIAM
86views Data Mining» more  SDM 2007»
15 years 2 months ago
Identifying Bundles of Product Options using Mutual Information Clustering
Mass-produced goods tend to be highly standardized in order to maximize manufacturing efficiencies. Some high-value goods with limited production quantities remain much less stand...
Claudia Perlich, Saharon Rosset
87
Voted
CIDR
2009
159views Algorithms» more  CIDR 2009»
15 years 1 months ago
RIOT: I/O-Efficient Numerical Computing without SQL
R is a numerical computing environment that is widely popular for statistical data analysis. Like many such environments, R performs poorly for large datasets whose sizes exceed t...
Yi Zhang 0011, Herodotos Herodotou, Jun Yang 0001