Sciweavers

470 search results - page 93 / 94
» Network Intrusion Detection Using an Improved Competitive Le...
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ICRA
2006
IEEE
125views Robotics» more  ICRA 2006»
13 years 11 months ago
An Ecological Approach to Odour Recognition in Intelligent Environments
— We present a new approach for odour detection and recognition based on a so-called PEIS-Ecology: a network of gas sensors and a mobile robot are integrated in an intelligent en...
Mathias Broxvall, Silvia Coradeschi, Amy Loutfi, A...
KDD
2006
ACM
191views Data Mining» more  KDD 2006»
14 years 6 months ago
Beyond classification and ranking: constrained optimization of the ROI
Classification has been commonly used in many data mining projects in the financial service industry. For instance, to predict collectability of accounts receivable, a binary clas...
Lian Yan, Patrick Baldasare

Book
34534views
15 years 4 months ago
OpenCV - Open Source Computer Vision Reference Manual
OpenCV is a C/C++ computer vision library originally developed by Intel. It is free for commercial and research use under a BSD license. The library is cross-platform. It is highl...
Intel
UIST
2004
ACM
13 years 11 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin