Sciweavers

6318 search results - page 123 / 1264
» Data Leakage Detection
Sort
View
JSW
2008
164views more  JSW 2008»
15 years 1 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
ICPR
2008
IEEE
15 years 8 months ago
On-line novelty detection using the Kalman filter and extreme value theory
Novelty detection is concerned with identifying abnormal system behaviours and abrupt changes from one regime to another. This paper proposes an on-line (causal) novelty detection...
Hyoungjoo Lee, Stephen J. Roberts
BILDMED
2009
130views Algorithms» more  BILDMED 2009»
15 years 3 months ago
Feature Processing for Automatic Anatomical Landmark Detection Using Reservoir Networks
We present an approach to the combination of an arbitrary number of image features to produce more sophisticated features for anatomical landmark detection. The combination was don...
Benjamin Roeschies, Susanne Winter
CLEF
2010
Springer
15 years 3 months ago
External Plagiarism Detection Based on Standard IR Technology and Fast Recognition of Common Subsequences - Lab Report for PAN a
The plagiarism detection system described in this paper is aiming at bringing external plagiarism detection to the desktop. The main ideas are to incorporate standard IR technologi...
Thomas Gottron
102
Voted
BMCBI
2008
110views more  BMCBI 2008»
15 years 2 months ago
Highly sensitive feature detection for high resolution LC/MS
Background: Liquid chromatography coupled to mass spectrometry (LC/MS) is an important analytical technology for e.g. metabolomics experiments. Determining the boundaries, centres...
Ralf Tautenhahn, Christoph Böttcher, Steffen ...