Sciweavers

1275 search results - page 99 / 255
» A Simple Focused Crawler
Sort
View
108
Voted
JMLR
2008
83views more  JMLR 2008»
15 years 3 months ago
Evidence Contrary to the Statistical View of Boosting
The statistical perspective on boosting algorithms focuses on optimization, drawing parallels with maximum likelihood estimation for logistic regression. In this paper we present ...
David Mease, Abraham Wyner
JSW
2008
164views more  JSW 2008»
15 years 3 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
107
Voted
MONET
2006
89views more  MONET 2006»
15 years 3 months ago
Sensing-based opportunistic channel access
Enabled by regulatory initiatives and advanced radio technology, more flexible opportunistic spectrum access has great potential to alleviate the spectrum scarcity. In this paper,...
Xin Liu, Sai Shankar N.
137
Voted
JCM
2007
126views more  JCM 2007»
15 years 3 months ago
Design Concepts and First Implementations for 24 GHz Wireless Sensor Nodes
— This paper reviews proposed realization concepts and achievements of wireless sensor nodes and focuses on new developments in the 24 GHz frequency range. The relatively high fr...
Stefan von der Mark, Meik Huber, Georg Boeck
114
Voted
TWC
2008
132views more  TWC 2008»
15 years 3 months ago
Robust high throughput space time block codes using parallel interference cancellation
We present a space-time coded system which achieves high throughput and good performance using lowcomplexity detection and decoding. We focus on a Rate 2 quasiorthogonal space-time...
Nicholas S. J. Pau, Desmond P. Taylor, Philippa A....