Sciweavers

1594 search results - page 222 / 319
» Sampling and Reconstruction of Operators
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
IJCV
2008
155views more  IJCV 2008»
13 years 9 months ago
Fast Transformation-Invariant Component Analysis
For software and more illustrations: http://www.psi.utoronto.ca/anitha/fastTCA.htm Dimensionality reduction techniques such as principal component analysis and factor analysis are...
Anitha Kannan, Nebojsa Jojic, Brendan J. Frey
IJNSEC
2007
107views more  IJNSEC 2007»
13 years 9 months ago
A Rule-based Temporal Alert Correlation System
This paper reports a research work to address the problem of the large number of alerts generated by the detectors in an intrusion detection system. Some of these alerts are redun...
Peyman Kabiri, Ali A. Ghorbani
JIRS
2007
78views more  JIRS 2007»
13 years 9 months ago
Online-learning and Attention-based Approach to Obstacle Avoidance Using a Range Finder
The problem of developing local reactive obstacle-avoidance behaviors by a mobile robot through online real-time learning is considered. The robot operated in an unknown bounded 2...
Shuqing Zeng, Juyang Weng
ICASSP
2010
IEEE
13 years 7 months ago
A hierarchical Bayesian model for frame representation
In many signal processing problems, it may be fruitful to represent the signal under study in a redundant linear decomposition called a frame. If a probabilistic approach is adopt...
Lotfi Chaâri, Jean-Christophe Pesquet, Jean-...