Sciweavers

1016 search results - page 111 / 204
» Evaluation of Expression Recognition Techniques
Sort
View
SIGMOD
2002
ACM
169views Database» more  SIGMOD 2002»
14 years 10 months ago
Covering indexes for branching path queries
In this paper, we ask if the traditional relational query acceleration techniques of summary tables and covering indexes have analogs for branching path expression queries over tr...
Raghav Kaushik, Philip Bohannon, Jeffrey F. Naught...
SIGMOD
2008
ACM
161views Database» more  SIGMOD 2008»
14 years 10 months ago
Efficient pattern matching over event streams
Pattern matching over event streams is increasingly being employed in many areas including financial services, RFIDbased inventory management, click stream analysis, and electroni...
Jagrati Agrawal, Yanlei Diao, Daniel Gyllstrom, Ne...
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 10 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
NIPS
2007
13 years 11 months ago
Kernels on Attributed Pointsets with Applications
This paper introduces kernels on attributed pointsets, which are sets of vectors embedded in an euclidean space. The embedding gives the notion of neighborhood, which is used to d...
Mehul Parsana, Sourangshu Bhattacharya, Chiru Bhat...
WCNC
2008
IEEE
14 years 4 months ago
Exact BER Performance of Asynchronous MC-DS-CDMA over Nakagami-m Fading Channels
—In this contribution an accurate average bit error rate (BER) formula is derived for Nakagami-faded MC-DSCDMA in the context of asynchronous transmissions and random spreading s...
Besma Smida, Lajos Hanzo, Sofiène Affes