Sciweavers

799 search results - page 114 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
13 years 5 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
14 years 8 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu
TSP
2010
13 years 2 months ago
Distributed detection of multi-hop information flows with fusion capacity constraints
The problem of detecting multi-hop information flows subject to communication constraints is considered. In a distributed detection scheme, eavesdroppers are deployed near nodes in...
Ameya Agaskar, Ting He, Lang Tong
PG
2003
IEEE
14 years 1 months ago
Neural Meshes: Statistical Learning Based on Normals
We present a method for the adaptive reconstruction of a surface directly from an unorganized point cloud. The algorithm is based on an incrementally expanding Neural Network and ...
Won-Ki Jeong, Ioannis P. Ivrissimtzis, Hans-Peter ...
HIS
2008
13 years 9 months ago
A Sequential Learning Resource Allocation Network for Image Processing Applications
Online adaptation is a key requirement for image processing applications when used in dynamic environments. In contrast to batch learning, where retraining is required each time a...
Stefan Wildermann, Jürgen Teich