Sciweavers

2362 search results - page 189 / 473
» A new approach to edge detection
Sort
View
DSN
2002
IEEE
15 years 6 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
122
Voted
ETRICS
2006
15 years 5 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CVPR
2009
IEEE
16 years 9 months ago
An Empirical Study of Context in Object Detection
This paper presents an empirical evaluation of the role of context in a contemporary, challenging object detection task – the PASCAL VOC 2008. Previous experiments with context...
Alexei A. Efros, Derek Hoiem, James Hays, Martial ...
106
Voted
ICML
2008
IEEE
16 years 2 months ago
Detecting statistical interactions with additive groves of trees
Discovering additive structure is an important step towards understanding a complex multi-dimensional function because it allows the function to be expressed as the sum of lower-d...
Daria Sorokina, Rich Caruana, Mirek Riedewald, Dan...
95
Voted
ICMCS
2006
IEEE
91views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Detecting Changes in User-Centered Music Query Streams
In this paper, we propose an efficient algorithm, called MQSchange (changes of Music Query Streams), to detect the changes of maximal melody structures in user-centered music quer...
Hua-Fu Li, Man-Kwan Shan, Suh-Yin Lee