Sciweavers

2604 search results - page 286 / 521
» Human Errors and System Requirements
Sort
View
VLDB
2005
ACM
125views Database» more  VLDB 2005»
14 years 3 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
IFIP
2004
Springer
14 years 3 months ago
BER Estimation for HiperLAN/2
This paper presents a method to estimate the bit error rate (BER) of the wireless channel based on statistical analysis of the soft output of the receiver only. In HiperLAN/2 sever...
Lodewijk T. Smit, Gerard J. M. Smit, Johann Hurink...
MCS
2004
Springer
14 years 3 months ago
High Security Fingerprint Verification by Perceptron-Based Fusion of Multiple Matchers
Recent works about perceptron-based fusion of multiple fingerprint matchers showed the effectiveness of such approach in improving the performance of personal identity verification...
Gian Luca Marcialis, Fabio Roli
ISCAS
2003
IEEE
168views Hardware» more  ISCAS 2003»
14 years 2 months ago
Hardware-oriented optimization and block-level architecture design for MPEG-4 FGS encoder
MPEG-4 Fine Granularity Scalability (FGS) provides bandwidth adaptation and error resilience features for streaming applications. In this paper. by estimating the required computa...
Chih-Wei Hsu, Yung-Chi Chang, Wei-Min Chao, Liang-...
ICCAL
1989
14 years 1 months ago
Signal Constellation Design Tool: A Case Study in User Interface Synthesis
Signal constellation design is a major subtask of constructing an efficient communication system; it essentially entails trading-off error frequency against information throughput...
Gabriel Robins