Sciweavers

123 search results - page 24 / 25
» A network intrusion detection method using independent compo...
Sort
View
CVPR
2008
IEEE
13 years 9 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
DATE
2000
IEEE
110views Hardware» more  DATE 2000»
13 years 12 months ago
Stochastic Modeling and Performance Evaluation for Digital Clock and Data Recovery Circuits
Clock and data recovery circuits are essential components in communication systems. They directly influence the bit-error-rate performance of communication links. It is desirable...
Alper Demir, Peter Feldmann
NIPS
1997
13 years 8 months ago
Extended ICA Removes Artifacts from Electroencephalographic Recordings
Severe contamination of electroencephalographic (EEG) activity by eye movements, blinks, muscle, heart and line noise is a serious problem for EEG interpretation and analysis. Rej...
Tzyy-Ping Jung, Colin Humphries, Te-Won Lee, Scott...
BMCBI
2005
198views more  BMCBI 2005»
13 years 7 months ago
Clustering protein sequences with a novel metric transformed from sequence similarity scores and sequence alignments with neural
Background: The sequencing of the human genome has enabled us to access a comprehensive list of genes (both experimental and predicted) for further analysis. While a majority of t...
Qicheng Ma, Gung-Wei Chirn, Richard Cai, Joseph D....
DSN
2004
IEEE
13 years 11 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda