Sciweavers

1127 search results - page 139 / 226
» Perspectives and Complex Aggregates
Sort
View
ICPR
2008
IEEE
14 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
VTC
2008
IEEE
14 years 4 months ago
Transmission Strategies for Parallel Relay Networks Based on Superposition Coding
—This paper is concerned with the transmission strategies and relay selection for decode-and-forward parallel relay networks (PRNs) based on superposition coding. Our focus is on...
Jianzhong Huang 0002, Yang Yang, Xinmei Wang, Peng...
FUZZIEEE
2007
IEEE
14 years 4 months ago
Monitoring the State of a Ubiquitous Robotic System: A Fuzzy Logic Approach
— A trend is emerging in the fields of ambient intelligence (AmI) and autonomous robotics, which points in the direction of a merger between these two fields. The inclusion of ...
Donatella Guarino, Alessandro Saffiotti
GLOBECOM
2007
IEEE
14 years 4 months ago
CSMA Self-Adaptation Based on Interference Differentiation
—this paper addresses the design challenge of interference mitigation in the emerging high density (HD) wireless LAN. It is proposed to differentiate interference according to th...
Jing Zhu, Xingang Guo, Sumit Roy, Konstantina Papa...
ICC
2007
IEEE
180views Communications» more  ICC 2007»
14 years 4 months ago
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks
— In contrast to the traditional wireless sensor network (WSN) applications that perform only data collection and aggregation, new generation of information processing applicatio...
Murat Demirbas, Xuming Lu