Sciweavers

852 search results - page 102 / 171
» SOM-Based Novelty Detection Using Novel Data
Sort
View
MOBIHOC
2007
ACM
14 years 10 months ago
Bounds for the capacity of wireless multihop networks imposed by topology and demand
Existing work on the capacity of wireless networks predominantly considers homogeneous random networks with random work load. The most relevant bounds on the network capacity, e.g...
Alireza Keshavarz-Haddad, Rudolf H. Riedi
ICRA
2010
IEEE
138views Robotics» more  ICRA 2010»
13 years 8 months ago
Mapping indoor environments based on human activity
— We present a novel approach to build approximate maps of structured environments utilizing human motion and activity. Our approach uses data recorded with a data suit which is ...
Slawomir Grzonka, Frederic Dijoux, Andreas Karwath...
ASPLOS
2006
ACM
14 years 4 months ago
AVIO: detecting atomicity violations via access interleaving invariants
Concurrency bugs are among the most difficult to test and diagnose of all software bugs. The multicore technology trend worsens this problem. Most previous concurrency bug detect...
Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
ICDE
2007
IEEE
183views Database» more  ICDE 2007»
14 years 11 months ago
SpADe: On Shape-based Pattern Detection in Streaming Time Series
Monitoring predefined patterns in streaming time series is useful to applications such as trend-related analysis, sensor networks and video surveillance. Most current studies on s...
Yueguo Chen, Mario A. Nascimento, Beng Chin Ooi, A...
ETRICS
2006
14 years 2 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...