Sciweavers

1773 search results - page 350 / 355
» High-level power estimation
Sort
View
ITIIS
2010
172views more  ITIIS 2010»
13 years 6 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
MA
2010
Springer
114views Communications» more  MA 2010»
13 years 6 months ago
Finite-sample inference with monotone incomplete multivariate normal data, II
We continue our recent work on finite-sample, i.e., non-asymptotic, inference with two-step, monotone incomplete data from Nd(µ, Σ), a multivariate normal population with mean ...
Wan-Ying Chang, Donald St. P. Richards
MIAR
2010
IEEE
13 years 6 months ago
Computational Decision Support for Percutaneous Aortic Valve Implantation
Valve replacement is the most common therapy for diseased aortic valves. Percutaneous approaches are becoming increasingly popular, due to reduced procedural complications and lowe...
Ingmar Voigt, Razvan Ioan Ionasec, Bogdan Georgesc...
PRL
2010
188views more  PRL 2010»
13 years 6 months ago
Sparsity preserving discriminant analysis for single training image face recognition
: Single training image face recognition is one of main challenges to appearance-based pattern recognition techniques. Many classical dimensionality reduction methods such as LDA h...
Lishan Qiao, Songcan Chen, Xiaoyang Tan
TIFS
2010
184views more  TIFS 2010»
13 years 6 months ago
Information-theoretically secret key generation for fading wireless channels
—The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, ...
Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra S...