Wavelet based data mining and querying in network security databases
暂无分享,去创建一个
Xing Li | Ping Ren | Wu Liu | Haixin Duan | Jian-Ping Wu | Haixin Duan | Wu Liu | P. Ren | Xing Li | Jian-Ping Wu | Jian-Ping Wu
[1] Dennis Gabor,et al. Theory of communication , 1946 .
[2] J. Morlet,et al. Wave propagation and sampling theory—Part II: Sampling theory and complex waves , 1982 .
[3] Stéphane Mallat,et al. Multifrequency channel decompositions of images and wavelet models , 1989, IEEE Trans. Acoust. Speech Signal Process..
[4] Guy Battle. Phase space localization theorem for ondelettes , 1989 .
[5] Ingrid Daubechies,et al. The wavelet transform, time-frequency localization and signal analysis , 1990, IEEE Trans. Inf. Theory.
[6] Jerome M. Shapiro,et al. Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..
[7] M. Y. Hussaini,et al. Wavelets: theory and applications , 1996 .
[8] Willi-Hans Steeb,et al. Hilbert Spaces, Wavelets, Generalised Functions and Modern Quantum Mechanics , 1998 .
[9] Willi-Hans Steeb. The nonlinear workbook : chaos, fractals, cellular automata, neural networks, genetic algorithms, fuzzy logic with C++, Java, SymbolicC++ and reduce programs , 1999 .
[10] Jianping Wu,et al. Wavelet-based analysis of network security databases , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..