Sciweavers

2156 search results - page 390 / 432
» Effective performance measurement and analysis of multithrea...
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
TASLP
2010
153views more  TASLP 2010»
13 years 7 months ago
On Optimal Frequency-Domain Multichannel Linear Filtering for Noise Reduction
Abstract—Several contributions have been made so far to develop optimal multichannel linear filtering approaches and show their ability to reduce the acoustic noise. However, th...
Mehrez Souden, Jacob Benesty, Sofiène Affes
WSCG
2004
143views more  WSCG 2004»
13 years 10 months ago
Palmprint Verification with Moments
Palmprint verification is an approach for verifying a palmprint input by matching the input to the claimed identity template stored in a database. If the dissimilarity measure bet...
Ying-Han Pang, Andrew Teoh Beng Jin, David Ngo Che...
BMCBI
2008
116views more  BMCBI 2008»
13 years 8 months ago
MScanner: a classifier for retrieving Medline citations
Background: Keyword searching through PubMed and other systems is the standard means of retrieving information from Medline. However, ad-hoc retrieval systems do not meet all of t...
Graham L. Poulter, Daniel L. Rubin, Russ B. Altman...
MOBIHOC
2010
ACM
13 years 6 months ago
The intrusion detection in mobile sensor network
Intrusion detection is an important problem in sensor networks. Prior works in static sensor environments show that constructing sensor barriers with random sensor deployment can ...
Gabriel Yik Keung, Bo Li, Qian Zhang