Sciweavers

619 search results - page 14 / 124
» Coalition detection and identification
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
96
Voted
CIVR
2004
Springer
248views Image Analysis» more  CIVR 2004»
15 years 1 months ago
Automated Person Identification in Video
Abstract. We describe progress in the automatic detection and identification of humans in video, given a minimal number of labelled faces as training data. This is an extremely cha...
Mark Everingham, Andrew Zisserman
SIGKDD
2008
93views more  SIGKDD 2008»
14 years 10 months ago
Breast cancer identification: KDD CUP winner's report
We describe the ideas and methodologies that we developed in addressing the KDD Cup 2008 on early breast cancer detection, and discuss how they contributed to our success. The mos...
Claudia Perlich, Prem Melville, Yan Liu 0002, Grze...
93
Voted
ICMCS
2008
IEEE
178views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Automatic character identification in feature-length films
This paper presents a novel approach to automatically identify characters in films using audio visual cues and text analysis. The approach consists of three stages: (i) frontal f...
Yifan Zhang, Changsheng Xu, Hanqing Lu
IDEAL
2005
Springer
15 years 3 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...