Sciweavers

405 search results - page 48 / 81
» Evaluation of Anomaly Detection Method Based on Pattern Reco...
Sort
View
183
Voted
VTC
2006
IEEE
199views Communications» more  VTC 2006»
15 years 9 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld
119
Voted
FLAIRS
2008
15 years 6 months ago
Complementary Analysis of High-Order Association Patterns and Classification
To facilitate more meaningful interpretation considering the internal interdependency relationships between data values, a new form of high-order (multiple-valued) pattern known a...
Thomas W. H. Lui, David K. Y. Chiu
129
Voted
ICB
2007
Springer
148views Biometrics» more  ICB 2007»
15 years 9 months ago
Walker Recognition Without Gait Cycle Estimation
Abstract. Most of gait recognition algorithms involve walking cycle estimation to accomplish signature matching. However, we may be plagued by two cycle-related issues when develop...
Daoliang Tan, Shiqi Yu, Kaiqi Huang, Tieniu Tan
157
Voted
SIBGRAPI
2005
IEEE
15 years 9 months ago
A Maximum Uncertainty LDA-Based Approach for Limited Sample Size Problems : With Application to Face Recognition
A critical issue of applying Linear Discriminant Analysis (LDA) is both the singularity and instability of the within-class scatter matrix. In practice, particularly in image recog...
Carlos E. Thomaz, Duncan Fyfe Gillies
122
Voted
IJDSN
2006
136views more  IJDSN 2006»
15 years 3 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...