Sciweavers

546 search results - page 52 / 110
» Using and Detecting Links in Wikipedia
Sort
View
WWW
2006
ACM
14 years 11 months ago
Detecting semantic cloaking on the web
By supplying different versions of a web page to search engines and to browsers, a content provider attempts to cloak the real content from the view of the search engine. Semantic...
Baoning Wu, Brian D. Davison
GLOBECOM
2007
IEEE
14 years 5 months ago
Decode-and-Forward Cooperative Relay with Multi-User Detection in Uplink CDMA Networks
Abstract— The use of multi-user detection (MUD) in a cooperative CDMA network is investigated for the uplink in synchronous CDMA systems. Suppose that, at any instant in time, pa...
Wan-Jen Huang, Yao-Win Hong, C. C. Jay Kuo
ISPA
2007
Springer
14 years 5 months ago
ECG Anomaly Detection via Time Series Analysis
—Recently, wireless sensor networks have been proposed for assisted living and residential monitoring. In such networks, physiological sensors are used to monitor vital signs e.g...
Mooi Choo Chuah, Fen Fu
CN
1999
93views more  CN 1999»
13 years 10 months ago
Bro: a system for detecting network intruders in real-time
We describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. We give ...
Vern Paxson
IJBIDM
2010
80views more  IJBIDM 2010»
13 years 9 months ago
Practical algorithms for subgroup detection in covert networks
: In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrat...
Nasrullah Memon, Uffe Kock Wiil, Abdul Rasool Qure...