Sciweavers

776 search results - page 117 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
ICASSP
2011
IEEE
14 years 5 months ago
Deep belief nets for natural language call-routing
This paper considers application of Deep Belief Nets (DBNs) to natural language call routing. DBNs have been successfully applied to a number of tasks, including image, audio and ...
Ruhi Sarikaya, Geoffrey E. Hinton, Bhuvana Ramabha...
TKDE
2008
134views more  TKDE 2008»
15 years 1 months ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
129
Voted
ICMLA
2009
14 years 11 months ago
Feature Extraction and Classification of EEG Signals for Rapid P300 Mind Spelling
The Mind Speller is a Brain-Computer Interface which enables subjects to spell text on a computer screen by detecting P300 Event-Related Potentials in their electroencephalograms....
Adrien Combaz, Nikolay V. Manyakov, Nikolay Chumer...
AVSS
2009
IEEE
15 years 5 months ago
Bayesian Bio-inspired Model for Learning Interactive Trajectories
—Automatic understanding of human behavior is an important and challenging objective in several surveillance applications. One of the main problems of this task consists in accur...
Alessio Dore, Carlo S. Regazzoni
RAID
2007
Springer
15 years 8 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...