Sciweavers

934 search results - page 66 / 187
» Anomaly Detection Using Visualization and Machine Learning
Sort
View
ALT
2007
Springer
15 years 7 months ago
Learning and Verifying Graphs Using Queries with a Focus on Edge Counting
We consider the problem of learning and verifying hidden graphs and their properties given query access to the graphs. We analyze various queries (edge detection, edge counting, sh...
Lev Reyzin, Nikhil Srivastava
NIPS
2001
14 years 11 months ago
Fast and Robust Classification using Asymmetric AdaBoost and a Detector Cascade
This paper develops a new approach for extremely fast detection in domains where the distribution of positive and negative examples is highly skewed (e.g. face detection or databa...
Paul A. Viola, Michael J. Jones
RAID
2000
Springer
15 years 1 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
ICST
2009
IEEE
15 years 4 months ago
A Model Building Process for Identifying Actionable Static Analysis Alerts
Automated static analysis can identify potential source code anomalies early in the software process that could lead to field failures. However, only a small portion of static ana...
Sarah Smith Heckman, Laurie A. Williams
ICRA
1999
IEEE
122views Robotics» more  ICRA 1999»
15 years 2 months ago
Learning Visual Landmarks for Pose Estimation
Abstract-- We present an approach to vision-based mobile robot localization, even without an a-priori pose estimate. This is accomplished by learning a set of visual features calle...
Robert Sim, Gregory Dudek