Sciweavers

164 search results - page 17 / 33
» Clustering Rules Using Empirical Similarity of Support Sets
Sort
View
ISMIS
2005
Springer
15 years 5 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
ICIP
2010
IEEE
14 years 9 months ago
Detecting pitching frames in baseball game video using Markov random walk
Pitching is the starting point of an event in baseball games. Hence, locating pitching shots is a critical step in content analysis of a baseball game video. However, pitching fra...
Chih-Yi Chiu, Po-Chih Lin, Wei-Ming Chang, Hsin-Mi...
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
15 years 6 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
BIOINFORMATICS
2006
92views more  BIOINFORMATICS 2006»
14 years 12 months ago
What should be expected from feature selection in small-sample settings
Motivation: High-throughput technologies for rapid measurement of vast numbers of biological variables offer the potential for highly discriminatory diagnosis and prognosis; howev...
Chao Sima, Edward R. Dougherty
PR
2006
164views more  PR 2006»
14 years 11 months ago
Locally linear metric adaptation with application to semi-supervised clustering and image retrieval
Many computer vision and pattern recognition algorithms are very sensitive to the choice of an appropriate distance metric. Some recent research sought to address a variant of the...
Hong Chang, Dit-Yan Yeung