Sciweavers

652 search results - page 62 / 131
» fast 2004
Sort
View
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 9 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
ADT
2006
13 years 7 months ago
Characterization and evaluation of TCP and UDP-based transport on real networks
Standard TCP (Reno TCP) does not perform well on fast long distance networks, due to its AIMD congestion control algorithm. In this paper we consider the effectiveness of various a...
Roger Les Cottrell, Saad Ansari, Parakram Khandpur...
ISBI
2004
IEEE
14 years 8 months ago
Cortical Surface Flattening Using Least Square Conformal Mapping with Minimal Metric Distortion
Although flattening a cortical surface necessarily introduces metric distortion due to the non-constant Gaussian curvature of the surface, the Riemann Mapping Theorem states that ...
Lili Ju, Josh Stern, Kelly Rehm, Kirt Schaper, Dav...
ICA
2004
Springer
14 years 1 months ago
Minimax Mutual Information Approach for ICA of Complex-Valued Linear Mixtures
Abstract. Recently, the authors developed the Minimax Mutual Information algorithm for linear ICA of real-valued mixtures, which is based on a density estimate stemming from Jaynes...
Jian-Wu Xu, Deniz Erdogmus, Yadunandana N. Rao, Jo...
DAGM
2004
Springer
14 years 1 months ago
Multi-step Entropy Based Sensor Control for Visual Object Tracking
We describe a method for selecting optimal actions affecting the sensors in a probabilistic state estimation framework, with an application in selecting optimal zoom levels for a ...
Benjamin Deutsch, Matthias Zobel, Joachim Denzler,...