Sciweavers

473 search results - page 72 / 95
» The multiplicative power of consensus numbers
Sort
View
ICPR
2008
IEEE
14 years 3 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
IV
2008
IEEE
100views Visualization» more  IV 2008»
14 years 3 months ago
Maestro: Design Challenges for a Group Calendar
Maestro - 3D group calendar visualizer aims at handling multiple schedules and highlighting common free times. One of the most powerful skills of Maestro is scalability according ...
Billur Engin, Mehves Cetinkaya, Elif E. Ayiter, Mu...
INFOCOM
2007
IEEE
14 years 3 months ago
Target-Oriented Scheduling in Directional Sensor Networks
— Unlike convectional omni-directional sensors that always have an omni-angle of sensing range, directional sensors may have a limited angle of sensing range due to technical con...
Yanli Cai, Wei Lou, Minglu Li, X.-Y. Li
VTC
2006
IEEE
14 years 2 months ago
Antenna Subset Selection with Bit Allocation for Multicarrier Spatial Diversity Transceivers
– In this paper, two novel algorithms are presented that simultaneously perform bit allocation and antenna subset selection for multicarrier spatial diversity transceivers. The g...
Alexander M. Wyglinski
VTC
2006
IEEE
14 years 2 months ago
Scheduling in Cellular CDMA-TDD Networks
Abstract— In this paper different scheduling algorithms applied to cellular CDMA (code division multiple access) systems with different duplexing modes are studied. In particular...
Ellina Foutekova, Patrick Agyapong, Birendra Ghimi...