Sciweavers

2434 search results - page 277 / 487
» Algorithmic Randomness of Closed Sets
Sort
View
ACSC
2005
IEEE
15 years 9 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
ICMCS
2005
IEEE
138views Multimedia» more  ICMCS 2005»
15 years 9 months ago
Overcomplete ICA-based Manmade Scene Classification
Principal Component Analysis (PCA) has been widely used to extract features for pattern recognition problems such as object recognition. Oliva and Torralba used “spatial envelop...
Matthew Boutell, Jiebo Luo
MOBIDE
2005
ACM
15 years 9 months ago
Context-aware optimization of continuous range queries maintenance for trajectories
This work addresses the problem of efficient maintenance of the (correct) answers to the continuous spatio-temporal range queries in Moving Objects Databases (MOD), which represen...
Goce Trajcevski, Hui Ding, Peter Scheuermann
SCALESPACE
2005
Springer
15 years 9 months ago
Relations Between Higher Order TV Regularization and Support Vector Regression
We study the connection between higher order total variation (TV) regularization and support vector regression (SVR) with spline kernels in a one-dimensional discrete setting. We p...
Gabriele Steidl, Stephan Didas, Julia Neumann
GD
2003
Springer
15 years 9 months ago
Track Drawings of Graphs with Constant Queue Number
A k-track drawing is a crossing-free 3D straight-line drawing of a graph G on a set of k parallel lines called tracks. The minimum value of k for which G admits a k-track drawing ...
Emilio Di Giacomo, Henk Meijer