Sciweavers

29 search results - page 5 / 6
» Online Boosting Based Intrusion Detection in Changing Enviro...
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 3 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ASC
2008
13 years 5 months ago
Info-fuzzy algorithms for mining dynamic data streams
Most data mining algorithms assume static behavior of the incoming data. In the real world, the situation is different and most continuously collected data streams are generated by...
Lior Cohen, Gil Avrahami, Mark Last, Abraham Kande...
ICAC
2006
IEEE
13 years 11 months ago
Enabling Self-Managing Applications using Model-based Online Control Strategies
— The increasing heterogeneity, dynamism, and uncertainty of emerging DCE (Distributed Computing Environment) systems imply that an application must be able to detect and adapt t...
Viraj Bhat, Manish Parashar, Hua Liu, Mohit Khande...
CVPR
2010
IEEE
13 years 5 months ago
High performance object detection by collaborative learning of Joint Ranking of Granules features
Object detection remains an important but challenging task in computer vision. We present a method that combines high accuracy with high efficiency. We adopt simplified forms of...
Chang Huang, Ramakant Nevatia
CVPR
2009
IEEE
1848views Computer Vision» more  CVPR 2009»
14 years 11 months ago
Moving Cast Shadow Detection using Physics-based Features
Cast shadows induced by moving objects often cause serious problems to many vision applications. We present in this paper an online statistical learning approach to model the backg...
Jia-Bin Huang and Chu-Song Chen