Sciweavers

852 search results - page 77 / 171
» SOM-Based Novelty Detection Using Novel Data
Sort
View
GLOBECOM
2009
IEEE
14 years 5 months ago
How Much Training Is Needed for Iterative Multiuser Detection and Decoding?
Abstract—This paper studies large randomly spread directsequence code-division multiple-access system operating over a block fading multipath channel. Channel knowledge is obtain...
Mikko Vehkaperä, Keigo Takeuchi, Ralf R. M&uu...
ACSAC
2008
IEEE
14 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CORR
2010
Springer
143views Education» more  CORR 2010»
13 years 10 months ago
Dendritic Cells for Anomaly Detection
Artificial immune systems, more specifically the negative selection algorithm, have previously been applied to intrusion detection. The aim of this research is to develop an intrus...
Julie Greensmith, Jamie Twycross, Uwe Aickelin
GIS
2008
ACM
14 years 11 months ago
Fast and extensible building modeling from airborne LiDAR data
This paper presents an automatic algorithm which reconstructs building models from airborne LiDAR (light detection and ranging) data of urban areas. While our algorithm inherits t...
Qian-Yi Zhou, Ulrich Neumann
ICIP
2006
IEEE
14 years 12 months ago
Detecting Occlusion for Hidden Markov Modeled Shapes
In this paper, we present a novel occlusion detection scheme for hidden Markov modeled shapes. First, hidden Markov model (HMM) is built using multiple examples of the shape. A re...
Ninad Thakoor, Sungyong Jung, Jean Gao