Sciweavers

5829 search results - page 1019 / 1166
» The Practice of Cluster Analysis
Sort
View
IJNSEC
2008
137views more  IJNSEC 2008»
15 years 4 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
IJCSS
2006
110views more  IJCSS 2006»
15 years 4 months ago
Business Engineering with Mobile Workforce Solutions
An analysis framework is presented that can be used to assess important issues of mobile workforce solutions, based on recent literature on mobile business. Within this framework ...
Yan Wang, Elisabeth van de Kar, Geleyn R. Meijer, ...
COMSIS
2007
80views more  COMSIS 2007»
15 years 4 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
CORR
2007
Springer
112views Education» more  CORR 2007»
15 years 4 months ago
On Optimum Power Allocation for the V-BLAST
—A unified analytical framework for optimum power allocation in the unordered V-BLAST algorithm and its comparative performance analysis are presented. Compact closed-form appro...
Victoria Kostina, Sergey Loyka
CORR
2007
Springer
164views Education» more  CORR 2007»
15 years 4 months ago
Consistency of the group Lasso and multiple kernel learning
We consider the least-square regression problem with regularization by a block 1-norm, that is, a sum of Euclidean norms over spaces of dimensions larger than one. This problem, r...
Francis Bach
« Prev « First page 1019 / 1166 Last » Next »