Sciweavers

1340 search results - page 231 / 268
» Spam Filter Analysis
Sort
View
JCM
2008
77views more  JCM 2008»
13 years 7 months ago
In-Field Attack Proof of Injected False Data in Sensor Networks
In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detec...
Zheng Wang, Xiaodong Lee, Xinchang Zhang, Baoping ...
SIGIR
2008
ACM
13 years 7 months ago
Classifiers without borders: incorporating fielded text from neighboring web pages
Accurate web page classification often depends crucially on information gained from neighboring pages in the local web graph. Prior work has exploited the class labels of nearby p...
Xiaoguang Qi, Brian D. Davison
TCOM
2008
100views more  TCOM 2008»
13 years 7 months ago
On the performance of concatenated convolutional code and Alamouti space-time code with noisy channel estimates and finite-depth
Abstract--In this paper, performance of the Alamouti spacetime code (STC) [1] and performance of the concatenation between the convolutional code and the Alamouti STC are derived. ...
Jittra Jootar, James R. Zeidler, John G. Proakis
TCOM
2008
124views more  TCOM 2008»
13 years 7 months ago
Reliable adaptive modulation and interference mitigation for mobile radio slow frequency hopping channels
: Due to correlated fading in frequency hopping (FH) wireless communication systems, it is possible to predict the future channel state information (CSI) for one frequency based on...
Ming Lei, Alexandra Duel-Hallen, Hans Hallen
TIFS
2008
179views more  TIFS 2008»
13 years 7 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...