Sciweavers

799 search results - page 152 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
BIOADIT
2004
Springer
14 years 1 months ago
Explaining Low-Level Brightness-Contrast Illusions Using Disinhibition
Conventional Difference of Gaussian (DOG) filter is usually used to model the early stage of visual processing. However, convolution operation used with DOG does not explicitly a...
Yingwei Yu, Takashi Yamauchi, Yoonsuck Choe
ICA
2004
Springer
14 years 1 months ago
3D Spatial Analysis of fMRI Data on a Word Perception Task
We discuss a 3D spatial analysis of fMRI data taken during a combined word perception and motor task. The event - based experiment was part of a study to investigate the network of...
Ingo R. Keck, Fabian J. Theis, Peter Gruber, Elmar...
WWW
2011
ACM
13 years 2 months ago
Predicting popular messages in Twitter
Social network services have become a viable source of information for users. In Twitter, information deemed important by the community propagates through retweets. Studying the c...
Liangjie Hong, Ovidiu Dan, Brian D. Davison
IPSN
2011
Springer
12 years 11 months ago
Duty-cycling buildings aggressively: The next frontier in HVAC control
Buildings are known to be the largest consumers of electricity in the United States, and often times the dominant energy consumer is the HVAC system. Despite this fact, in most bu...
Yuvraj Agarwal, Bharathan Balaji, Seemanta Dutta, ...
SOUPS
2006
ACM
14 years 1 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...