Sciweavers

8177 search results - page 179 / 1636
» Detecting System Emulators
Sort
View
ETT
2006
88views Education» more  ETT 2006»
13 years 10 months ago
On the outage behaviour of large DS-CDMA systems with LMMSE detection
Abstract-- The outage behaviour of the single cell DSCDMA uplink is investigated for flat Rayleigh fading channels. Goal of the work is to find an analytical way for the optimisati...
Oliver Prätor, Gerhard Fettweis
HICSS
2008
IEEE
90views Biometrics» more  HICSS 2008»
14 years 5 months ago
Power System Extreme Event Detection: The Vulnerability Frontier
In this work we apply graph theoretic tools to provide a close bound on a frontier relating the number of line outages in a grid to the power disrupted by the outages. This fronti...
Bernard C. Lesieutre, Ali Pinar, Sandip Roy
ASPLOS
2010
ACM
14 years 5 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli
BMCBI
2004
124views more  BMCBI 2004»
13 years 10 months ago
XHM: A system for detection of potential cross hybridizations in DNA microarrays
Background: Microarrays have emerged as the preferred platform for high throughput gene expression analysis. Cross-hybridization among genes with high sequence similarities can be...
Kristian Flikka, Fekadu Yadetie, Astrid Lægr...
ICWSM
2010
14 years 6 days ago
Why do Users Tag? Detecting Users' Motivation for Tagging in Social Tagging Systems
While recent progress has been achieved in understanding the structure and dynamics of social tagging systems, we know little about the underlying user motivations for tagging, an...
Markus Strohmaier, Christian Körner, Roman Ke...