Sciweavers

912 search results - page 47 / 183
» Anomaly
Sort
View
HCI
2001
13 years 10 months ago
Localisation and linguistic anomalies
Interactive systems may seek to accommodate users whose first language is not English. Usually, this entails a focus on translation and related features of localisation. While suc...
George R. S. Weir, Giorgos Lepouras
AINA
2007
IEEE
13 years 9 months ago
Detecting Anomaly Node Behavior in Wireless Sensor Networks
Wireless sensor networks are usually deployed in a way “once deployed, never changed”. The actions of sensor nodes are either pre-scheduled inside chips or triggered to respon...
Qinghua Wang, Tingting Zhang
ISI
2006
Springer
13 years 8 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
RAID
2010
Springer
13 years 7 months ago
Community Epidemic Detection Using Time-Correlated Anomalies
Abstract. An epidemic is malicious code running on a subset of a community, a homogeneous set of instances of an application. Syzygy is an epidemic detection framework that looks f...
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
IGARSS
2009
13 years 6 months ago
Robust Endmember Extraction in the Presence of Anomalies
Most available methods for endmember extraction use the convexity of the data structure and consider the vertices of the data as the purest pixels. Such methods do not consider th...
Olga Duran, Maria Petrou