Sciweavers

153 search results - page 23 / 31
» Properties of Signature Change Patterns
Sort
View
JSAC
2006
165views more  JSAC 2006»
13 years 7 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
IJISTA
2007
86views more  IJISTA 2007»
13 years 7 months ago
Film audio pace
:We explore the concept of film pace expressed through audio to analyse the film at a semantic level. We use domain knowledge to derive a number of measures for film audio pace....
Simon Moncrieff, Svetha Venkatesh
HT
2009
ACM
14 years 2 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
13 years 11 months ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
GECCO
2003
Springer
123views Optimization» more  GECCO 2003»
14 years 21 days ago
Benefits of Implicit Redundant Genetic Algorithms for Structural Damage Detection in Noisy Environments
A robust structural damage detection method that can handle noisy frequency response function information is discussed. The inherent unstructured nature of damage detection problem...
Anne M. Raich, Tamás Liszkai