Sciweavers

1734 search results - page 264 / 347
» Design Patterns for Reconfigurable Computing
Sort
View
CCS
2009
ACM
15 years 9 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
UM
2009
Springer
15 years 9 months ago
Predicting Customer Models Using Behavior-Based Features in Shops
Abstract. Recent sensor technologies have enabled the capture of users’ behavior data. Given the large amount of data currently available from sensor-equipped environments, it is...
Junichiro Mori, Yutaka Matsuo, Hitoshi Koshiba, Ke...
MOBIWAC
2006
ACM
15 years 8 months ago
Sink mobility protocols for data collection in wireless sensor networks
In wireless sensor networks data propagation is usually performed by sensors transmitting data towards a static control center (sink). Inspired by important applications (mostly r...
Ioannis Chatzigiannakis, Athanasios Kinalis, Sotir...
GLVLSI
2005
IEEE
132views VLSI» more  GLVLSI 2005»
15 years 8 months ago
Interconnect capacitance extraction for system LCD circuits
This paper discusses interconnect capacitance extraction for system LCD circuits, where coupling capacitance is much significant since a ground plane locates far away unlike LSI ...
Yoshihiro Uchida, Sadahiro Tani, Masanori Hashimot...
SIGIR
2005
ACM
15 years 8 months ago
A phonotactic-semantic paradigm for automatic spoken document classification
We demonstrate a phonotactic-semantic paradigm for spoken document categorization. In this framework, we define a set of acoustic words instead of lexical words to represent acous...
Bin Ma, Haizhou Li