Results 1 - 10
of
65
Credit Card Fraud Detection with a Neural-Network,”
- Proc. 27th Hawaii Int‟l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems,
, 1994
"... Abstract Using data from a credit card issuer, a neural network based fraud detection system was trained on a large sample of labelled credit card account transactions and tested on a holdout data set that consisted of all account activity over a subsequent two-month period of time. The neural netw ..."
Abstract
-
Cited by 74 (0 self)
- Add to MetaCart
to credit card losses due to charge-offs of seriously delinquent accounts (charge-offs accounted for $8.5 billion of losses in 1992). fraud represents an increasing percentage of total charge volume, indicating that it is growing faster than the credit card business itself. From 1988 through 1991, the size
The Role of the Teaching Context in Hong Kong English Teachers' Perceptions of L2 Writing Pedagogy
"... This paper examines the ways in which L2 writing is perceived and its pedagogy conceptualised by English language teachers in Hong Kong secondary schools. It then attempts to delineate the factors that shape teacher perceptions. Data for this study were gathered through a questionnaire survey, whic ..."
Abstract
- Add to MetaCart
that conditions for teacher perceptions will be subject to change as the context becomes more sensitive to the discourse-related and cognitive factors within L2 writing that recent developments in curriculum renewal and language teacher education in Hong Kong are likely to bring. Introduction It is well
1Compressive Link Acquisition in Multiuser Communications
"... Abstract—An important receiver operation is to detect the presence specific preamble signals with unknown delays in the presence of scattering, Doppler effects and carrier offsets. This task, referred to as “link acquisition”, is typically a sequential search over the transmitted signal space. Recen ..."
Abstract
- Add to MetaCart
-known probabil-ity divergence measure, the average Kullback-Leibler distance, of all the hypotheses of the SR-LRT performed on the samples. We compare the proposed acquisition scheme vis-à-vis conventional alternatives with relatively low computational cost, such as the Matched Filter (MF), in terms
copyright by
, 2009
"... Abstract: Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are two recently-developed technologies that uniquely function without xed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many applicati ..."
Abstract
- Add to MetaCart
Abstract: Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are two recently-developed technologies that uniquely function without xed infrastructure support, and sense at scales, resolutions, and durations previously not possible. While both offer great potential in many applications, developing software for these types of networks is extremely dffcult, preventing their wide-spread use. Three primary challenges are (1) the high level of dynamics within the network in terms of changing wireless links and node hardware con gurations, (2) the wide variety of hardware present in these networks, and (3) the extremely limited computational and energy resources available. Until now, the burden of handling these issues was put on the software application developer. This dissertation presents three novel programming models and middleware systems that address these challenges: Limone, Agilla, and Servilla. Limone reliably handles high levels of dynamics within MANETs. It does this through lightweight coordination primitives that make minimal assumptions about network connectivity. Agilla enables self-adaptive WSN applications via the integration of mobile agent and tuple space programming models, which is critical given the continuously changing network. It is the rst system to successfully demonstrate the feasibility of using mobile agents and tuple spaces within
4. TITLE AND SUBTITLE A Practical Theory of Micro-Solar Power Sensor Networks
, 2009
"... Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract
- Add to MetaCart
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
3esis Supervisor Accepted by
, 2005
"... in partial ful2llment of the requirements for the degree of ..."
RICE UNIVERSITY Regime Change: Sampling Rate vs. Bit-Depth in Compressive Sensing
, 2011
"... The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order of t ..."
Abstract
- Add to MetaCart
The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order
Results 1 - 10
of
65