Sciweavers

6318 search results - page 82 / 1264
» Data Leakage Detection
Sort
View
AAAI
2008
15 years 4 months ago
Prediction and Change Detection in Sequential Data for Interactive Applications
We consider the problems of sequential prediction and change detection that arise often in interactive applications: A semi-automatic predictor is applied to a time-series and is ...
Jun Zhou, Li Cheng, Walter F. Bischof
IEEEIAS
2009
IEEE
15 years 8 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
ICDM
2008
IEEE
179views Data Mining» more  ICDM 2008»
15 years 8 months ago
Detection and Exploration of Outlier Regions in Sensor Data Streams
Sensor networks play an important role in applications concerned with environmental monitoring, disaster management, and policy making. Effective and flexible techniques are need...
Conny Franke, Michael Gertz
IWPC
2000
IEEE
15 years 6 months ago
Evaluating the Accessor Classification Approach to Detect Abstract Data Types
ng the Accessor Classification Approach to Detect Abstract Data Types icle presents an approach to identify abstract data types (ADTs) in source code. For each structured type deï...
Jean-Francois Girard, Martin Würthner
AAAI
2010
15 years 3 months ago
A Layered Approach to People Detection in 3D Range Data
People tracking is a key technology for autonomous systems, intelligent cars and social robots operating in populated environments. What makes the task difficult is that the appea...
Luciano Spinello, Kai Oliver Arras, Rudolph Triebe...