Sciweavers

1555 search results - page 243 / 311
» Using Macromodels to Manage Collections of Related Models
Sort
View
ACSAC
2003
IEEE
14 years 25 days ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
ICSE
2000
IEEE-ACM
14 years 23 days ago
Software metrics: roadmap
Software metrics as a subject area is over 30 years old, but it has barely penetrated into mainstream software engineering. A key reason for this is that most software metrics act...
Norman E. Fenton, Martin Neil
3DIM
2007
IEEE
14 years 3 months ago
Cached k-d tree search for ICP algorithms
The ICP (Iterative Closest Point) algorithm is the de facto standard for geometric alignment of threedimensional models when an initial relative pose estimate is available. The ba...
Andreas Nüchter, Kai Lingemann, Joachim Hertz...
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
14 years 9 months ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin
VTC
2007
IEEE
200views Communications» more  VTC 2007»
14 years 3 months ago
General Analysis of Uplink Group-Orthogonal MC-CDMA systems
Abstract—Group-orthogonal multicarrier code-division multiple access (GO-MC-CDMA) has been proposed as a multiplexing technique for the uplink segment of wireless systems. The di...
Guillem Femenias, Felip Riera-Palou, Jaume Ramis