Sciweavers

439 search results - page 38 / 88
» An Evaluation Framework for Plagiarism Detection
Sort
View
ICC
2007
IEEE
15 years 7 months ago
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Syed A. Khayam, Hayder Radha
ICDM
2006
IEEE
226views Data Mining» more  ICDM 2006»
15 years 7 months ago
Converting Output Scores from Outlier Detection Algorithms into Probability Estimates
Current outlier detection schemes typically output a numeric score representing the degree to which a given observation is an outlier. We argue that converting the scores into wel...
Jing Gao, Pang-Ning Tan
MASCOTS
2010
15 years 2 months ago
OnTimeDetect: Dynamic Network Anomaly Notification in perfSONAR Deployments
To monitor and diagnose bottlenecks on network paths used for large-scale data transfers, there is an increasing trend to deploy measurement frameworks such as perfSONAR. These dep...
Prasad Calyam, Jialu Pu, Weiping Mandrawa, Ashok K...
TMI
2008
84views more  TMI 2008»
15 years 1 months ago
Optimal Wavelet Transform for the Detection of Microaneurysms in Retina Photographs
In this article, we propose an automatic method to detect microaneurysms in retina photographs. Microaneurysms are the most frequent and usually the first lesions to appear as a co...
Gwénolé Quellec, Mathieu Lamard, P. ...
ICCV
2009
IEEE
16 years 6 months ago
Quantifying Contextual Information for Object Detection
Context is critical for minimising ambiguity in object de- tection. In this work, a novel context modelling framework is proposed without the need of any prior scene segmen- tat...
Wei-Shi Zheng, Shaogang Gong and Tao Xiang