Sciweavers

758 search results - page 25 / 152
» Coding Exon Detection Using Comparative Sequences
Sort
View
WCE
2007
13 years 11 months ago
Analysis of User Specific Interleavers for Iterative Multi-User Detection System
—Interleave division multiple access (IDMA) and orthogonal frequency division multiplexing – interleave division multiple access (OFDM-IDMA) have been proposed for beyond third...
Omer Nawaz, Waqas Nasir, Zia Bhadiar, Imtiaz Ahmed...
ISCAS
2008
IEEE
155views Hardware» more  ISCAS 2008»
14 years 4 months ago
Advanced colluder detection techniques for OSIFT-based hiding codes
— In this work, we examine a family of anti-collusion codes using the principle of “Orthogonal Spreading followed by the Inverse Fourier Transform (OSIFT)” as introduced in [...
Byung-Ho Cha, C. C. Jay Kuo
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
14 years 2 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
KBSE
2008
IEEE
14 years 4 months ago
SpotWeb: Detecting Framework Hotspots and Coldspots via Mining Open Source Code on the Web
—Software developers often face challenges in reusing open source frameworks due to several factors such as the framework complexity and lack of proper documentation. In this pap...
Suresh Thummalapenta, Tao Xie
AVSS
2008
IEEE
14 years 4 months ago
Recognizing Shapes in Video Sequences Using Multi-class Boosting
We model the spatio-temporal variations of the shape of objects in a video sequence using a unique SVD-like decomposition. The decomposition is used to compute shape features, whi...
Naresh P. Cuntoor, Matt Welborn