Sciweavers

8575 search results - page 1561 / 1715
» A Model of Learning Using the Internet
Sort
View
RAID
2010
Springer
15 years 1 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ACL
2010
15 years 1 months ago
Bitext Dependency Parsing with Bilingual Subtree Constraints
This paper proposes a dependency parsing method that uses bilingual constraints to improve the accuracy of parsing bilingual texts (bitexts). In our method, a targetside tree frag...
Wenliang Chen, Jun'ichi Kazama, Kentaro Torisawa
DAGM
2009
Springer
15 years 1 months ago
HMM-Based Defect Localization in Wire Ropes - A New Approach to Unusual Subsequence Recognition
Abstract. Automatic visual inspection has become an important application of pattern recognition, as it supports the human in this demanding and often dangerous work. Nevertheless,...
Esther-Sabrina Platzer, Josef Nägele, Karl-He...
123
Voted
ICDAR
2009
IEEE
15 years 1 months ago
Analysis of Book Documents' Table of Content Based on Clustering
Table of contents (TOC) recognition has attracted a great deal of attention in recent years. After reviewing the merits and drawbacks of the existing TOC recognition methods, we h...
Liangcai Gao, Zhi Tang, Xiaofan Lin, Xin Tao, Yimi...
JMLR
2010
185views more  JMLR 2010»
14 years 10 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
« Prev « First page 1561 / 1715 Last » Next »