Sciweavers

24 search results - page 4 / 5
» IDGraphs: Intrusion Detection and Analysis Using Stream Comp...
Sort
View
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 3 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
MM
2005
ACM
146views Multimedia» more  MM 2005»
13 years 11 months ago
Unsupervised content discovery in composite audio
Automatically extracting semantic content from audio streams can be helpful in many multimedia applications. Motivated by the known limitations of traditional supervised approache...
Rui Cai, Lie Lu, Alan Hanjalic
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
13 years 11 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
MM
2004
ACM
183views Multimedia» more  MM 2004»
13 years 11 months ago
Content-based music structure analysis with applications to music semantics understanding
In this paper, we present a novel approach for music structure analysis. A new segmentation method, beat space segmentation, is proposed and used for music chord detection and voc...
Namunu Chinthaka Maddage, Changsheng Xu, Mohan S. ...
RAID
2007
Springer
13 years 12 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...