Sciweavers

IJACTAICIT
2010
123views more  IJACTAICIT 2010»
13 years 27 days ago
A Hybrid Fault-Proneness Detection Approach Using Text Filtering and Static Code Analysis
We have proposed a fault-prone software module detection method using text-filtering approach, called Fault-proneness filtering. Even though the fault-proneness filtering achieved...
Osamu Mizuno, Hideaki Hata
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 3 months ago
An Effective Anomaly Detection Method in SMTP Traffic
We investigate an effective and robust mechanism for detecting SMTP traffic anomaly. Our detection method cumulates the deviation of current delivering status from history behavio...
Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu
ICONIP
2008
13 years 5 months ago
An Evaluation of Machine Learning-Based Methods for Detection of Phishing Sites
In this paper, we present the performance of machine learning-based methods for detection of phishing sites. We employ 9 machine learning techniques including AdaBoost, Bagging, S...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
DNA
2003
Springer
114views Bioinformatics» more  DNA 2003»
13 years 8 months ago
RCA-Based Detection Methods for Resolution Refutation
In molecular resolution refutation, the detection of empty clauses is important. We propose a rolling circle amplification-based detection method for resolution refutation. The ro...
In-Hee Lee, Ji-Yoon Park, Young-Gyu Chai, Byoung-T...
AUSAI
2003
Springer
13 years 8 months ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho
HICSS
2003
IEEE
124views Biometrics» more  HICSS 2003»
13 years 9 months ago
Identifying Transformer Incipient Events for Maintaining Distribution System Reliability
This paper presents the time domain and timefrequency domain analysis results of incipient events in single-phase distribution transformers. This analysis will aid in the developm...
Karen L. Butler-Purry, Mustafa Bagriyanik
CIVR
2005
Springer
122views Image Analysis» more  CIVR 2005»
13 years 9 months ago
Semantic Event Detection in Structured Video Using Hybrid HMM/SVM
In this paper, we propose a new semantic event detection algorithm in structured video. A hybrid method that combines HMM with SVM to detect semantic events in video is proposed. T...
Tae Meon Bae, Cheon Seog Kim, Sung Ho Jin, Ki Hyun...
ICC
2007
IEEE
13 years 10 months ago
Detection of Frequency-Hopped Waveforms Embedded in Interference Waveforms with Noise
—Bandwidth usage has become more complex such that it is not uncommon that multiple signals of appreciable power may be present within the same bandwidth. The presence of multipl...
John Weber, Kyle Kowalske, Clark Robertson, Frank ...