Sciweavers

619 search results - page 11 / 124
» Coalition detection and identification
Sort
View
AUTOMATICA
2006
94views more  AUTOMATICA 2006»
14 years 10 months ago
Subspace identification for FDI in systems with non-uniformly sampled multirate data
This paper proposes a novel subspace approach towards direct identification of a residual model for fault detection and isolation (FDI) in a system with non-uniformly sampled mult...
Weihua Li, Zhengang Han, Sirish L. Shah
102
Voted
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 2 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
79
Voted
DPHOTO
2009
138views Hardware» more  DPHOTO 2009»
14 years 8 months ago
Statistical identification and analysis of defect development in digital imagers
The lifetime of solid-state image sensors is limited by the appearance of defects, particularly hot-pixels, which we have previously shown to develop continuously over the sensor ...
Jenny Leung, Glenn H. Chapman, Zahava Koren, Israe...
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
14 years 8 months ago
Towards Community Discovery in Signed Collaborative Interaction Networks
Abstract--We propose a framework for discovery of collaborative community structure in Wiki-based knowledge repositories based on raw-content generation analysis. We leverage topic...
Petko Bogdanov, Nicholas D. Larusso, Ambuj K. Sing...
82
Voted
HICSS
2005
IEEE
190views Biometrics» more  HICSS 2005»
15 years 3 months ago
Blob Analysis of the Head and Hands: A Method for Deception Detection
Behavioral indicators of deception and behavioral state are extremely difficult for humans to analyze. Blob analysis, a method for analyzing the movement of the head and hands bas...
Shan Lu, Gabriel Tsechpenakis, Dimitris N. Metaxas...