Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Standard TCP (Reno TCP) does not perform well on fast long distance networks, due to its AIMD congestion control algorithm. In this paper we consider the effectiveness of various a...
Roger Les Cottrell, Saad Ansari, Parakram Khandpur...
Although flattening a cortical surface necessarily introduces metric distortion due to the non-constant Gaussian curvature of the surface, the Riemann Mapping Theorem states that ...
Lili Ju, Josh Stern, Kelly Rehm, Kirt Schaper, Dav...
Abstract. Recently, the authors developed the Minimax Mutual Information algorithm for linear ICA of real-valued mixtures, which is based on a density estimate stemming from Jaynes...
Jian-Wu Xu, Deniz Erdogmus, Yadunandana N. Rao, Jo...
We describe a method for selecting optimal actions affecting the sensors in a probabilistic state estimation framework, with an application in selecting optimal zoom levels for a ...
Benjamin Deutsch, Matthias Zobel, Joachim Denzler,...