Sciweavers

235 search results - page 24 / 47
» A comparison of normal estimation schemes
Sort
View
NDSS
2003
IEEE
14 years 1 months ago
Detecting Service Violations and DoS Attacks
Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the reso...
Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava
ICCV
2007
IEEE
14 years 9 months ago
Spherical-Homoscedastic Shapes
Shape analysis requires invariance under translation, scale and rotation. Translation and scale invariance can be realized by normalizing shape vectors with respect to their mean ...
Onur C. Hamsici, Aleix M. Martínez
TCBB
2010
176views more  TCBB 2010»
13 years 6 months ago
Feature Selection for Gene Expression Using Model-Based Entropy
—Gene expression data usually contain a large number of genes, but a small number of samples. Feature selection for gene expression data aims at finding a set of genes that best...
Shenghuo Zhu, Dingding Wang, Kai Yu, Tao Li, Yihon...
TWC
2008
132views more  TWC 2008»
13 years 7 months ago
Robust high throughput space time block codes using parallel interference cancellation
We present a space-time coded system which achieves high throughput and good performance using lowcomplexity detection and decoding. We focus on a Rate 2 quasiorthogonal space-time...
Nicholas S. J. Pau, Desmond P. Taylor, Philippa A....
ICASSP
2011
IEEE
12 years 11 months ago
Keypoint-based near-duplicate images detection using affine invariant feature and color matching
This paper presents a new keypoint-based approach to nearduplicate images detection. It consists of three steps. Firstly, the keypoints of images are extracted and then matched. S...
Yue Wang, Zujun Hou, Karianto Leman