Sciweavers

2269 search results - page 360 / 454
» Behavioral Intrusion Detection
Sort
View
DATE
2007
IEEE
138views Hardware» more  DATE 2007»
14 years 4 months ago
An ADC-BiST scheme using sequential code analysis
This paper presents a built-in self-test (BiST) scheme for analog to digital converters (ADC) based on a linear ramp generator and efficient output analysis. The proposed analysi...
Erdem Serkan Erdogan, Sule Ozev
ICC
2007
IEEE
229views Communications» more  ICC 2007»
14 years 4 months ago
Uplink-Downlink Duality of ICI Cancellation in OFDMA Systems with Carrier-Frequency Offset
— In orthogonal frequency-division multiplex access (OFDMA) systems, including uplink and downlink, the carrierfrequency offset (CFO) between the multiple transceivers introduces...
Min Huang, Ming Zhao 0001, Shidong Zhou, Jing Wang...
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 4 months ago
Graph-Based Detector for BLAST Architecture
Abstract— We propose belief propagation (BP) based detection algorithms for the Bell labs layered space-time (BLAST) architectures. We first develop a full complexity BP algorit...
Jun Hu, Tolga M. Duman
ICCS
2007
Springer
14 years 4 months ago
Learning Common Outcomes of Communicative Actions Represented by Labeled Graphs
We build a generic methodology based on learning and reasoning to detect specific attitudes of human agents and patterns of their interactions. Human attitudes are determined in te...
Boris Galitsky, Boris Kovalerchuk, Sergei O. Kuzne...
KI
2007
Springer
14 years 4 months ago
Location-Based Activity Recognition
Learning patterns of human behavior from sensor data is extremely important for high-level activity inference. We show how to extract and label a person’s activities and signi...
Dieter Fox