Sciweavers

15351 search results - page 2871 / 3071
» The information bottleneck method
Sort
View
126
Voted
CCS
2003
ACM
15 years 6 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
114
Voted
HIPC
2003
Springer
15 years 6 months ago
Parallel and Distributed Frequent Itemset Mining on Dynamic Datasets
Traditional methods for data mining typically make the assumption that data is centralized and static. This assumption is no longer tenable. Such methods waste computational and I/...
Adriano Veloso, Matthew Eric Otey, Srinivasan Part...
IPMI
2003
Springer
15 years 5 months ago
Ideal-Observer Performance under Signal and Background Uncertainty
We use the performance of the Bayesian ideal observer as a figure of merit for hardware optimization because this observer makes optimal use of signal-detection information. Due t...
Subok Park, Matthew A. Kupinski, Eric Clarkson, Ha...
108
Voted
ITNG
2010
IEEE
15 years 5 months ago
D-SeDGAM: A Dynamic Service Differentiation Based GTS Allocation Mechanism for IEEE 802.15.4 WSN
—The plethora of applications for Wireless Sensor Networks (WSN) has experienced significant growth in recent years. Every application has a different set of requirements and it ...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
108
Voted
ICRA
2002
IEEE
152views Robotics» more  ICRA 2002»
15 years 5 months ago
Mobile Robot Self-Localization in Large-Scale Environments
— This paper presents a new approach for the absolute self-localization of a mobile robot in structured large-scale environments. The requirements with regard to both, the necess...
Axel Lankenau, Thomas Röfer
« Prev « First page 2871 / 3071 Last » Next »