Sciweavers

2414 search results - page 405 / 483
» Computing Normal Subgroups
Sort
View
IMC
2010
ACM
13 years 7 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
SAICSIT
2010
ACM
13 years 7 months ago
Towards energy efficient mobile communications
The rapid growth and development of wireless communication services and applications corresponds to an increase in associated energy consumption. For broadband wireless network de...
Moshe T. Masonta, Mjumo Mzyece, Ntsibane Ntlatlapa
SAICSIT
2010
ACM
13 years 7 months ago
Determining the user profile for an adaptable training platform
Adaptive computer-based training systems aim to enhance the learning experience by personalising the presentation and content delivery according to the preferences of each particu...
Mardé Greeff, Quentin Williams, Roné...
GLOBECOM
2009
IEEE
13 years 7 months ago
Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems
Primary user emulation attack in multichannel cognitive radio systems is discussed. An attacker is assumed to be able to send primary-user-like signals during spectrum sensing peri...
Husheng Li, Zhu Han
ICDAR
2009
IEEE
13 years 7 months ago
Extraction of Characters on Signboards in Natural Scene Images by Stump Classifiers
We present a method to detect characters on signboards in natural scene images. For many applications, both classifier with small computational cost and the efficient feature set,...
Minoru Maruyama, Takuma Yamaguchi