Sciweavers

8177 search results - page 294 / 1636
» Detecting System Emulators
Sort
View
PRL
2006
207views more  PRL 2006»
15 years 3 months ago
On-line trajectory clustering for anomalous events detection
In this paper we propose a trajectory clustering algorithm suited for video surveillance systems. Trajectories are clustered on-line, as the data are collected, and clusters are o...
Claudio Piciarelli, Gian Luca Foresti
125
Voted
EMNLP
2010
15 years 1 months ago
We're Not in Kansas Anymore: Detecting Domain Changes in Streams
Domain adaptation, the problem of adapting a natural language processing system trained in one domain to perform well in a different domain, has received significant attention. Th...
Mark Dredze, Tim Oates, Christine D. Piatko
ACL
2009
15 years 1 months ago
Using Generation for Grammar Analysis and Error Detection
We demonstrate that the bidirectionality of deep grammars, allowing them to generate as well as parse sentences, can be used to automatically and effectively identify errors in th...
Michael Goodman, Francis Bond
GECCO
2009
Springer
150views Optimization» more  GECCO 2009»
15 years 10 months ago
Integrating real-time analysis with the dendritic cell algorithm through segmentation
As an immune inspired algorithm, the Dendritic Cell Algorithm (DCA) has been applied to a range of problems, particularly in the area of intrusion detection. Ideally, the intrusio...
Feng Gu, Julie Greensmith, Uwe Aickelin
145
Voted
SPIN
2009
Springer
15 years 10 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...