Sciweavers

268 search results - page 23 / 54
» Locating Hidden Groups in Communication Networks Using Hidde...
Sort
View
ETRICS
2006
13 years 11 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
DAGSTUHL
2007
13 years 9 months ago
Logical Particle Filtering
Abstract. In this paper, we consider the problem of filtering in relational hidden Markov models. We present a compact representation for such models and an associated logical par...
Luke S. Zettlemoyer, Hanna M. Pasula, Leslie Pack ...
PERCOM
2011
ACM
12 years 11 months ago
Is ontology-based activity recognition really effective?
—While most activity recognition systems rely on data-driven approaches, the use of knowledge-driven techniques is gaining increasing interest. Research in this field has mainly...
Daniele Riboni, Linda Pareschi, Laura Radaelli, Cl...
CNSR
2004
IEEE
131views Communications» more  CNSR 2004»
13 years 11 months ago
Fast Flow Classification over Internet
In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about the...
A. Oveissian, Kavé Salamatian, Augustin Sou...
CORR
2011
Springer
191views Education» more  CORR 2011»
13 years 2 months ago
A Message-Passing Receiver for BICM-OFDM over Unknown Clustered-Sparse Channels
We propose a factor-graph-based approach to joint channel-estimationand-decoding of bit-interleaved coded orthogonal frequency division multiplexing (BICM-OFDM). In contrast to ex...
Philip Schniter