Sciweavers

516 search results - page 66 / 104
» Comparing Two Information Flow Security Properties
Sort
View
LAWEB
2003
IEEE
14 years 2 months ago
Clustering the Chilean Web
We perform a clustering of the Chilean Web Graph using a local fitness measure, optimized by simulated annealing, and compare the obtained cluster distribution to that of two mod...
Satu Virtanen
ESANN
2004
13 years 10 months ago
HMM and IOHMM modeling of EEG rhythms for asynchronous BCI systems
We compare the use of two Markovian models, HMMs and IOHMMs, to discriminate between three mental tasks for brain computer interface systems using an asynchronous protocol. We show...
Silvia Chiappa, Nicolas Donckers, Samy Bengio, Fr&...
CSDA
2007
102views more  CSDA 2007»
13 years 9 months ago
On the robust detection of edges in time series filtering
Abstract: Abrupt shifts in the level of a time series represent important information and should be preserved in statistical signal extraction. We investigate rules for detecting l...
Roland Fried
ICWSM
2008
13 years 10 months ago
Logsonomy: A Search Engine Folksonomy
In social bookmarking systems users describe bookmarks by keywords called tags. The structure behind these social systems, called folksonomies, can be viewed as a tripartite hyper...
Robert Jäschke, Beate Krause, Andreas Hotho, ...
NTMS
2009
IEEE
14 years 3 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...