Detection theory

Results: 1119



#Item
311Estimation theory / Regression analysis / Stochastic processes / Trend estimation / SeaWiFS / Autocorrelation / Time series / Variance / MERIS / Statistics / Time series analysis / Signal processing

1 Detection of linear trends in multi-sensor time series in presence of 2

Add to Reading List

Source URL: public.enst-bretagne.fr

Language: English - Date: 2013-03-26 04:11:48
312Finite groups / Data mining / Detection theory / Receiver operating characteristic / Statistical classification / Subgroup / Rule induction / CN2 algorithm / Heuristic / Abstract algebra / Group theory / Algebra

Mach Learn: 33–63 DOIs10994Propositionalization-based relational subgroup discovery with RSD ˇ

Add to Reading List

Source URL: www-ai.ijs.si

Language: English - Date: 2013-03-25 05:42:51
313Abstract algebra / Eigenvalues and eigenvectors / Matrix theory / Singular value decomposition / Vector space / Derivative / Image gradient / Sturm–Liouville theory / Kanade–Lucas–Tomasi feature tracker / Algebra / Mathematics / Linear algebra

Shape and Motion from Image Streams: a Factorization Method—Part 3 Detection and Tracking of Point Features Technical Report CMU-CSCarlo Tomasi

Add to Reading List

Source URL: www.lira.dist.unige.it

Language: English - Date: 2011-11-21 17:22:38
314Coding theory / Error detection and correction / Matrices / Computer arithmetic / Numerical linear algebra / Matrix / Logical matrix / Hamming / Closest string / Algebra / Mathematics / Linear algebra

Matrix multiplication and pattern matching under Hamming norm Rapha¨el Clifford January 23, 2009 Abstract My understanding of a conversation with Ely Porat who in turn attributes Piotr Indyk.

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 07:07:10
315Forward error correction / Coding theory / Fiber-optic communication / Optical fiber / Technology / Multi-mode optical fiber / Dispersion / Electromagnetic radiation / Error detection and correction / Photonics / Optics

Microsoft PowerPoint - Kim ECOC 2009.ppt

Add to Reading List

Source URL: conference.vde.com

Language: English - Date: 2009-11-04 12:22:21
316Information / Turbo code / Forward error correction / Repetition code / Convolutional code / Concatenated error correction code / Interleaving / Eb/N0 / Bit error rate / Error detection and correction / Information theory / Telecommunications engineering

Design and Evaluation of High Performance Error-Correcting Codes

Add to Reading List

Source URL: www.teambasedlearning.org

Language: English - Date: 2011-05-19 11:27:01
317Spamming / File sharing networks / Concurrent computing / Botnets / Storm botnet / Peer-to-peer / Kad network / Malware / DoSnet / Multi-agent systems / Computer network security / Computing

Botnet detection revisited: Theory and Practice of Finding Malicious P2P Networks via Internet Connection Graphs Stefan Ruehrup, Pierfrancesco Urbano, Andreas Berger, Alessandro D’Alconzo FTW, Vienna, Austria

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:32:55
318Finite fields / Information theory / Mathematics / Coding theory / Matrix / Error detection and correction

Rabin’s     Informa.on  Dispersal  Algorithm:     A  Prescient  Look  at     Coding  on  Networks   Michael  Mitzenmacher  

Add to Reading List

Source URL: people.seas.harvard.edu

Language: English
319Computational statistics / Learning / Anomaly detection / Data mining / Data security / Intrusion detection system / Concept learning / Boosting / Supervised learning / Machine learning / Statistics / Learning theory

To appear in Proceedings of the ACM Symposium on Information, Computer, and Communication Security, March 2006 Can Machine Learning Be Secure? Marco Barreno

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2006-02-11 16:41:05
320Anomaly detection / Data security / Statistical theory / Cluster analysis / Anomaly / Entropy / Denial-of-service attack / Traffic flow / Statistics / Data mining / Thermodynamic entropy

Mining Anomalies Using Traffic Feature Distributions Christophe Diot  Anukool Lakhina

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-20 07:38:53
UPDATE