Sciweavers

12257 search results - page 2096 / 2452
» Analysis of Algorithms
Sort
View
ICEIS
2008
IEEE
15 years 11 months ago
Internal Fraud Risk Reduction - Results of a Data Mining Case Study
Corporate fraud these days represents a huge cost to our economy. Academic literature already concentrated on how data mining techniques can be of value in the fight against frau...
Mieke Jans, Nadine Lybaert, Koen Vanhoof
135
Voted
ICPR
2008
IEEE
15 years 11 months ago
Adaptive context recognition based on audio signal
Auditory data provide many contextual cues about the crucial content of environments around. The goal of audio based context recognition is to equip the sensing devices with class...
Zhi Zeng, Xin Li, Xiaohong Ma, Qiang Ji
127
Voted
ICPR
2008
IEEE
15 years 11 months ago
Evaluation of clustering methods for finding dominant optical flow fields in crowded scenes
Video footage of real crowded scenes still poses severe challenges for automated surveillance. This paper evaluates clustering methods for finding independent dominant motion fi...
Günther Eibl, Norbert Brändle
ICRA
2008
IEEE
185views Robotics» more  ICRA 2008»
15 years 11 months ago
Human detection using multimodal and multidimensional features
— This paper presents a novel human detection method based on a Bayesian fusion approach using laser range data and camera images. Laser range data analysis groups data points wi...
Luciano Spinello, Roland Siegwart
IEEEARES
2008
IEEE
15 years 11 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
« Prev « First page 2096 / 2452 Last » Next »