Sciweavers

5948 search results - page 1158 / 1190
» Computing Robust Counter-Strategies
Sort
View
ISVC
2007
Springer
15 years 4 months ago
Boosting with Temporal Consistent Learners: An Application to Human Activity Recognition
We present a novel boosting algorithm where temporal consistency is addressed in a short-term way. Although temporal correlation of observed data may be an important cue for classi...
Pedro Canotilho Ribeiro, Plinio Moreno, José...
RAID
2007
Springer
15 years 3 months ago
"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
Xuxian Jiang, Xinyuan Wang
SCALESPACE
2007
Springer
15 years 3 months ago
Scale Spaces on Lie Groups
In the standard scale space approach one obtains a scale space representation u : Rd R+ → R of an image f ∈ L2(Rd ) by means of an evolution equation on the additive group (Rd ...
Remco Duits, Bernhard Burgeth
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
15 years 3 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 3 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
« Prev « First page 1158 / 1190 Last » Next »