Sciweavers

951 search results - page 54 / 191
» Differential testing: a new approach to change detection
Sort
View
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 3 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
IEEEIAS
2008
IEEE
15 years 8 months ago
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment
Modern cars offer an increasingly powerful Multimedia environment. While also the potential for an application as Human Computer Interface (HCI) is growing, in this paper we conce...
Tobias Hoppe, Stefan Kiltz, Jana Dittmann
ESORICS
2006
Springer
15 years 5 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
ECCV
1998
Springer
16 years 3 months ago
Shape Representations from Shading Primitives
Diffuse interreflections mean that surface shading and shape are related in ways that are difficult to untangle; in particular, distant and invisible surfaces may affect the shadi...
John A. Haddon, David A. Forsyth
KDD
2004
ACM
190views Data Mining» more  KDD 2004»
16 years 2 months ago
V-Miner: using enhanced parallel coordinates to mine product design and test data
Analyzing data to find trends, correlations, and stable patterns is an important task in many industrial applications. This paper proposes a new technique based on parallel coordi...
Kaidi Zhao, Bing Liu, Thomas M. Tirpak, Andreas Sc...