Sciweavers

2362 search results - page 202 / 473
» A new approach to edge detection
Sort
View
RAID
2009
Springer
15 years 8 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
126
Voted
SPIN
2009
Springer
15 years 8 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
KDD
2007
ACM
148views Data Mining» more  KDD 2007»
16 years 2 months ago
Detecting research topics via the correlation between graphs and texts
In this paper we address the problem of detecting topics in large-scale linked document collections. Recently, topic detection has become a very active area of research due to its...
Yookyung Jo, Carl Lagoze, C. Lee Giles
98
Voted
SMC
2007
IEEE
111views Control Systems» more  SMC 2007»
15 years 8 months ago
Towards Visual Exploration of Topic Shifts
— This paper presents two approaches to visually analyze the topic shift of a pool of documents over a given period of time. The first of the proposed methods is based on a mult...
Kilian Thiel, Fabian Dill, Tobias Kötter, Mic...
127
Voted
ICMCS
2005
IEEE
116views Multimedia» more  ICMCS 2005»
15 years 7 months ago
Video Object Boundary Reconstruction by 2-Pass Voting
In this paper we propose a voting-based object boundary reconstruction approach. Tensor voting has been studied by many people recently, and it can be used for boundary estimation...
Like Zhang, Qi Tian, Nicu Sebe, Jingsheng Ma