Sciweavers

2144 search results - page 319 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
JUCS
2006
92views more  JUCS 2006»
15 years 4 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
CCR
2005
64views more  CCR 2005»
15 years 4 months ago
A methodology for studying persistency aspects of internet flows
We focus in this paper on Internet flows, consider their contributions to the overall traffic per time unit or bin, and perform a multi-scale and multi-protocol analysis to explor...
Jörg Wallerich, Holger Dreger, Anja Feldmann,...
TWC
2008
133views more  TWC 2008»
15 years 4 months ago
Analytical results about the robustness of FMT modulation with several prototype pulses in time-frequency selective fading chann
In this paper we study the performance of Filtered Multitone (FMT) modulation systems in time-frequency selective fading channels. FMT generalizes the OFDM scheme through the deplo...
Andrea M. Tonello, Francesco Pecile
COMCOM
2004
79views more  COMCOM 2004»
15 years 4 months ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
15 years 2 months ago
K-AP: Generating Specified K Clusters by Efficient Affinity Propagation
Abstract--The Affinity Propagation (AP) clustering algorithm proposed by Frey and Dueck (2007) provides an understandable, nearly optimal summary of a data set. However, it suffers...
Xiangliang Zhang, Wei Wang, Kjetil Nørv&ari...