Sciweavers

419 search results - page 39 / 84
» Is a detector only good for detection
Sort
View
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Semantic 3D Face Mesh Simplification for Transmission and Visualization
Three-dimensional data generated from range scanners is usually composed of a huge amount of information. Simplification and compression techniques must be adopted in order to red...
Alessandro Colombo, Claudio Cusano, Raimondo Schet...
ICASSP
2011
IEEE
12 years 11 months ago
On the implementation of MIMO-OFDM schemes using perturbation of the QR decomposition: Application to 3GPP LTE-a systems
Consider a flat-fading Multiple-Input Multiple-Output (MIMO) system. The near-optimum detection problematic has been shown to be efficiently solved through QR Decomposition (QRD...
Sébastien Aubert, Jane Tournois, Fabienne N...
TSP
2010
13 years 2 months ago
Statistical detection of congestion in routers
Detection of congestion plays a key role in numerous networking protocols, including those driving Active Queue Management (AQM) methods used in congestion control in Internet rout...
Ivan D. Barrera, Stephan Bohacek, Gonzalo R. Arce
ACSAC
2007
IEEE
14 years 2 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu