Sciweavers

167 search results - page 26 / 34
» A distributed scheme for detection of information flows
Sort
View
CSL
2006
Springer
13 years 7 months ago
A study in machine learning from imbalanced data for sentence boundary detection in speech
Enriching speech recognition output with sentence boundaries improves its human readability and enables further processing by downstream language processing modules. We have const...
Yang Liu, Nitesh V. Chawla, Mary P. Harper, Elizab...
PPOPP
2003
ACM
14 years 24 days ago
Compactly representing parallel program executions
Collecting a program’s execution profile is important for many reasons: code optimization, memory layout, program debugging and program comprehension. Path based execution pro...
Ankit Goel, Abhik Roychoudhury, Tulika Mitra
ISBI
2006
IEEE
14 years 8 months ago
Modeling and measurement of elastic laminae in arteries
Analysis of elastic laminae provides vital information on both the gross and fine structures of the arterial wall, which is vital to assess issues such as mechanical damage caused...
Hai Xu, Jin-Jia Hu, Jay D. Humphrey, Jyh-Charn Liu
APNOMS
2006
Springer
13 years 11 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon
ICDCSW
2007
IEEE
14 years 1 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...