Sciweavers

1155 search results - page 215 / 231
» Computer aided analysis and design of power transformers
Sort
View
IMC
2010
ACM
13 years 6 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
TIT
2008
141views more  TIT 2008»
13 years 8 months ago
Dimensionality Reduction for Distributed Estimation in the Infinite Dimensional Regime
Distributed estimation of an unknown signal is a common task in sensor networks. The scenario usually envisioned consists of several nodes, each making an observation correlated wi...
Olivier Roy, Martin Vetterli
IEEEVAST
2010
13 years 3 months ago
Finding and visualizing relevant subspaces for clustering high-dimensional astronomical data using connected morphological opera
Data sets in astronomy are growing to enormous sizes. Modern astronomical surveys provide not only image data but also catalogues of millions of objects (stars, galaxies), each ob...
Bilkis J. Ferdosi, Hugo Buddelmeijer, Scott Trager...
CIVR
2007
Springer
231views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Classification of video events using 4-dimensional time-compressed motion features
Among the various types of semantic concepts modeled, events pose the greatest challenge in terms of computational power needed to represent the event and accuracy that can be ach...
Alexander Haubold, Milind R. Naphade