Sciweavers

2056 search results - page 147 / 412
» Detecting Errors in Spreadsheets
Sort
View
CIA
2008
Springer
15 years 6 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
ICONIP
2008
15 years 5 months ago
Detecting Methods of Virus Email Based on Mail Header and Encoding Anomaly
In this paper, we try to develop a machine learning-based virus email detection method. The key feature of this paper is employing Mail Header and Encoding Anomaly(MHEA) [1]. MHEA ...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
TASLP
2002
93views more  TASLP 2002»
15 years 4 months ago
Robust endpoint detection and energy normalization for real-time speech and speaker recognition
When automatic speech recognition (ASR) and speaker verification (SV) are applied in adverse acoustic environments, endpoint detection and energy normalization can be crucial to th...
Qi Li, Jinsong Zheng, A. Tsai, Qiru Zhou
ICC
2007
IEEE
15 years 10 months ago
Diversity Coherent Receivers for Optical Communication over the Clear Turbulent Atmosphere
—Optical communication through the atmosphere possibly enables high data rate communication. However, the optical field undergoes fades or outages due to air turbulence. Spatial ...
Etty J. Lee, Vincent W. S. Chan
MICRO
2000
IEEE
80views Hardware» more  MICRO 2000»
15 years 8 months ago
Silent stores for free
Silent store instructions write values that exactly match the values that are already stored at the memory address that is being written. A recent study reveals that significant ...
Kevin M. Lepak, Mikko H. Lipasti