Sciweavers

934 search results - page 35 / 187
» Anomaly Detection Using Visualization and Machine Learning
Sort
View
ICALT
2005
IEEE
15 years 3 months ago
Understanding Object-Oriented Software through Virtual Role-Play
Visualization techniques are commonly used in computer science, particularly for understanding the interactions intrinsic in the object-oriented paradigm. The visualization effect...
Guillermo Jiménez-Díaz, Mercedes G&o...
AUSAI
2010
Springer
14 years 8 months ago
Database Normalization as a By-product of Minimum Message Length Inference
Database normalization is a central part of database design in which we re-organise the data stored so as to progressively ensure that as few anomalies occur as possible upon inser...
David L. Dowe, Nayyar Abbas Zaidi
ADHOCNETS
2009
Springer
15 years 4 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
ECCV
2010
Springer
15 years 1 months ago
Anomalous Behaviour Detection using Spatiotemporal Oriented Energies, Subset Inclusion Histogram Comparison and Event-Driven Pro
Abstract. This paper proposes a novel approach to anomalous behaviour detection in video. The approach is comprised of three key components. First, distributions of spatiotemporal ...
CORR
2010
Springer
149views Education» more  CORR 2010»
14 years 10 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh