Sciweavers

276 search results - page 43 / 56
» PAC-Learning of Markov Models with Hidden State
Sort
View
SECON
2010
IEEE
13 years 4 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das
CNSR
2004
IEEE
131views Communications» more  CNSR 2004»
13 years 10 months ago
Fast Flow Classification over Internet
In order to control and manage highly aggregated Internet traffic flows efficiently, we need to be able to categorize flows into distinct classes and to be knowledgeable about the...
A. Oveissian, Kavé Salamatian, Augustin Sou...
DKE
2007
130views more  DKE 2007»
13 years 6 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
DCC
2003
IEEE
14 years 21 hour ago
Rate-Distortion Bound for Joint Compression and Classification
- Rate-distortion theory is applied to the problem of joint compression and classification. A Lagrangian distortion measure is used to consider both the squared Euclidean error in ...
Yanting Dong, Lawrence Carin
ETRICS
2006
13 years 10 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...