Sciweavers

54 search results - page 8 / 11
» A Method for Evaluating Elicitation Schemes for Probabilitie...
Sort
View
ML
2008
ACM
248views Machine Learning» more  ML 2008»
13 years 7 months ago
Feature selection via sensitivity analysis of SVM probabilistic outputs
Feature selection is an important aspect of solving data-mining and machine-learning problems. This paper proposes a feature-selection method for the Support Vector Machine (SVM) l...
Kai Quan Shen, Chong Jin Ong, Xiao Ping Li, Einar ...
CGF
2008
137views more  CGF 2008»
13 years 7 months ago
Exploiting Visibility Correlation in Direct Illumination
The visibility function in direct illumination describes the binary visibility over a light source, e.g., an environment map. Intuitively, the visibility is often strongly correla...
Petrik Clarberg, Tomas Akenine-Möller
CCS
2007
ACM
14 years 1 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
GLOBECOM
2006
IEEE
14 years 1 months ago
Adaptive MIMO-OFDM Cellular System with Soft Handover between Distributed Base Station Antennas
— The joint cooperative processing of transmitted signal from several multiple-input multiple-output (MIMO) base station (BS) antenna heads is considered for users located within...
Antti Tölli, Marian Codreanu, Markku J. Juntt...
INFOCOM
2011
IEEE
12 years 11 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang