Sciweavers

1016 search results - page 142 / 204
» Evaluation of Expression Recognition Techniques
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Interference alignment in clustered ad hoc networks: High reliability regime and per-cluster aloha
Wireless networks are fundamentally limited by the intensity of the received signals and the mutual interference caused by many concurrent transmissions. We consider large wireles...
Roland Tresch, Giusi Alfano, Maxime Guillaud
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 4 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
ICML
2005
IEEE
14 years 10 months ago
Large scale genomic sequence SVM classifiers
In genomic sequence analysis tasks like splice site recognition or promoter identification, large amounts of training sequences are available, and indeed needed to achieve suffici...
Bernhard Schölkopf, Gunnar Rätsch, S&oum...
SAC
2010
ACM
14 years 4 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
CCS
2009
ACM
14 years 4 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...