Sciweavers

8177 search results - page 230 / 1636
» Detecting System Emulators
Sort
View
NAACL
2010
14 years 10 months ago
Streaming First Story Detection with application to Twitter
With the recent rise in popularity and size of social media, there is a growing need for systems that can extract useful information from this amount of data. We address the probl...
Sasa Petrovic, Miles Osborne, Victor Lavrenko
102
Voted
ICPR
2008
IEEE
15 years 7 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
104
Voted
AVSS
2007
IEEE
15 years 7 months ago
Real-time detection of illegally parked vehicles using 1-D transformation
With decreasing costs of high quality surveillance systems, human activity detection and tracking has become increasingly practical. Accordingly, automated systems have been desig...
Jong Taek Lee, Michael S. Ryoo, Matthew Riley, Jak...
96
Voted
DSOM
2008
Springer
15 years 2 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
81
Voted
PUC
2010
114views more  PUC 2010»
14 years 11 months ago
Mobile phone-based pervasive fall detection
Falls are a major health risk that diminishes the quality of life among the elderly people. The importance of fall detection increases as the elderly population surges, especially ...
Jiangpeng Dai, Xiaole Bai, Zhimin Yang, Zhaohui Sh...