Sciweavers

CEC
2010
IEEE
13 years 5 months ago
Evolving cascades of voting feature detectors for vehicle detection in satellite imagery
We propose an evolutionary method for detection of vehicles in satellite imagery which involves a large number of simple elementary features and multiple detectors trained by genet...
Krzysztof Krawiec, Bartosz Kukawka, Tomasz Macieje...
NIPS
1998
13 years 5 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp
NIPS
2001
13 years 5 months ago
Fast and Robust Classification using Asymmetric AdaBoost and a Detector Cascade
This paper develops a new approach for extremely fast detection in domains where the distribution of positive and negative examples is highly skewed (e.g. face detection or databa...
Paul A. Viola, Michael J. Jones
HIS
2001
13 years 5 months ago
A Bayesian Track-before-Detect Algorithm for IR Point Target Detection
An algorithm has been developed for the detection of point targets in uncluttered background based on a Bayesian track before detect method. The algorithm has an application in th...
Robert C. Warren
DMIN
2006
106views Data Mining» more  DMIN 2006»
13 years 5 months ago
A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile
This paper describes an effective medical claim fraud/abuse detection system based on data mining used by a Chilean private health insurance company. Fraud and abuse in medical cla...
Pedro A. Ortega, Cristián J. Figueroa, Gonz...
CDES
2006
101views Hardware» more  CDES 2006»
13 years 5 months ago
Hybrid Error-Detection Approach with No Detection Latency for High-Performance Microprocessors
- Error detection plays an important role in fault-tolerant computer systems. Two primary parameters concerned for error detection are the latency and coverage. In this paper, a ne...
Yung-Yuan Chen, Kuen-Long Leu, Li-Wen Lin
USS
2008
13 years 6 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
AAAI
2007
13 years 6 months ago
COD: Online Temporal Clustering for Outbreak Detection
We present Cluster Onset Detection (COD), a novel algorithm to aid in detection of epidemic outbreaks. COD employs unsupervised learning techniques in an online setting to partiti...
Tomás Singliar, Denver Dash
CCS
2010
ACM
13 years 7 months ago
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection
Capturing Fast-Flux Service Networks (FFSNs) by temporal variances is an intuitive way for seeking to identify rapid changes of DNS records. Unfortunately, the features regard to ...
Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee
EDBT
2010
ACM
156views Database» more  EDBT 2010»
13 years 7 months ago
Pattern detector: fast detection of suspicious stream patterns for immediate reaction
Detecting emerging problems in information and manufacturing systems is the goal of monitoring tools. Good and timely detection of problematic conditions from measured indicators ...
Ira Assent, Hardy Kremer, Stephan Günnemann, ...