Sciweavers

551 search results - page 74 / 111
» Simulation metamodels for modeling output distribution param...
Sort
View
RAID
2010
Springer
13 years 6 months ago
Bait Your Hook: A Novel Detection Technique for Keyloggers
Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
JCM
2008
94views more  JCM 2008»
13 years 7 months ago
Cell Site Power Characterization for Multi-rate Wireless CDMA Data Networks Using Lognormal Approximation
An analytical model is developed to solve the power-rate assignment problem for multi-rate CDMA systems and calculate the probability density function (PDF) for the downlink traffi...
Ashraf S. Hasan Mahmoud
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
14 years 2 months ago
Automatic high-precision self-calibration of camera-robot systems
— In this article a new method is presented to obtain a full and precise calibration of camera-robot systems with eyein-hand cameras. It achieves a simultaneous and numerically s...
Andreas Jordt, Nils T. Siebel, Gerald Sommer
IBPRIA
2007
Springer
14 years 1 months ago
Bayesian Oil Spill Segmentation of SAR Images Via Graph Cuts
Abstract. This paper extends and generalizes the Bayesian semisupervised segmentation algorithm [1] for oil spill detection using SAR images. In the base algorithm on which we buil...
Sónia Pelizzari, José M. Bioucas-Dia...
ICC
2008
IEEE
112views Communications» more  ICC 2008»
14 years 2 months ago
Weighted Fair Uplink/Downlink Access Provisioning in IEEE 802.11e WLANs
— We present the unfairness problem between the uplink and the downlink flows in the IEEE 802.11e infrastructure Basic Service Set (BSS) when the default settings of the Enhance...
Feyza Keceli, Inanc Inan, Ender Ayanoglu