Sciweavers

459 search results - page 75 / 92
» Detecting induced subgraphs
Sort
View
DPD
2002
125views more  DPD 2002»
13 years 7 months ago
Parallel Mining of Outliers in Large Database
Data mining is a new, important and fast growing database application. Outlier (exception) detection is one kind of data mining, which can be applied in a variety of areas like mon...
Edward Hung, David Wai-Lok Cheung
ICMCS
2009
IEEE
219views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Moving targets labeling and correspondence over multi-camera surveillance system based on Markov network
In this paper, we propose an efficient way to simultaneously label and map targets over a multi-camera surveillance system. In the system, we first fuse the detection results from...
Chingchun Huang, Sheng-Jyh Wang
TSP
2010
13 years 2 months ago
A non-iterative technique for phase noise ICI mitigation in packet-based OFDM systems
In this paper, a practical approach for detecting packet-based orthogonal frequency division multiplexing (OFDM) signals in the presence of phase noise is presented. An OFDM packe...
Payam Rabiei, Won Namgoong, Naofal Al-Dhahir
EUROSYS
2008
ACM
14 years 4 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
AIRWEB
2009
Springer
14 years 2 months ago
Tag spam creates large non-giant connected components
Spammers in social bookmarking systems try to mimick bookmarking behaviour of real users to gain the attention of other users or search engines. Several methods have been proposed...
Nicolas Neubauer, Robert Wetzker, Klaus Obermayer