Sciweavers

1265 search results - page 12 / 253
» Better Burst Detection
Sort
View
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 6 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
CN
2006
84views more  CN 2006»
13 years 7 months ago
Distributed mechanism in detecting and defending against the low-rate TCP attack
In this paper, we consider a distributed mechanism to detect and to defend against the low-rate TCP attack. The low-rate TCP attack is a recently discovered attack. In essence, it ...
Haibin Sun, John C. S. Lui, David K. Y. Yau
27
Voted
PAMI
2007
196views more  PAMI 2007»
13 years 7 months ago
Bayesian Analysis of Lidar Signals with Multiple Returns
—Time-Correlated Single Photon Counting and Burst Illumination Laser data can be used for range profiling and target classification. In general, the problem is to analyze the res...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...
ICML
2005
IEEE
14 years 8 months ago
Modeling word burstiness using the Dirichlet distribution
Multinomial distributions are often used to model text documents. However, they do not capture well the phenomenon that words in a document tend to appear in bursts: if a word app...
Rasmus Elsborg Madsen, David Kauchak, Charles Elka...
ICIP
2007
IEEE
14 years 9 months ago
Multi-Scale Statistical Detection and Ballistic Imaging Through Turbid Media
We exploit recent advances in the physical design of fast optical systems which enable active imaging with "ballistic" light. In this modality, fast bursts of optical en...
Sina Farsiu, Peyman Milanfar