Sciweavers

3955 search results - page 589 / 791
» Comparing the Power of Robots
Sort
View
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
14 years 4 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
ICASSP
2008
IEEE
14 years 4 months ago
Energy efficient change detection over a MAC using physical layer fusion
We propose a simple and energy efficient distributed Change Detection scheme for sensor networks based on Page’s parametric CUSUM algorithm. The sensor observations are IID ove...
Taposh Banerjee, Veeraruna Kavitha, Vinod Sharma
ICIP
2008
IEEE
14 years 4 months ago
Correlation Embedding Analysis
—Beyond conventional linear and kernel-based feature extraction, we present a more generalized formulation for feature extraction in this paper. Two representative algorithms usi...
Yun Fu, Thomas S. Huang
ICIP
2008
IEEE
14 years 4 months ago
Design and performance of a novel low-density parity-check code for distributed video coding
Low-density parity-check (LDPC) codes are nowadays one of the hottest topics in coding theory, notably due to their advantages in terms of bit error rate performance and low compl...
João Ascenso, Catarina Brites, Fernando Per...
ICPR
2008
IEEE
14 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi