Sciweavers

2100 search results - page 299 / 420
» Fundamentals of the problem
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 4 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
SIGGRAPH
2010
ACM
15 years 4 months ago
Motion-based video retargeting with optimized crop-and-warp
We introduce a video retargeting method that achieves high-quality resizing to arbitrary aspect ratios for complex videos containing diverse camera and dynamic motions. Previous c...
Yu-Shuen Wang, Hui-Chih Lin, Olga Sorkine, Tong-Ye...
ER
2006
Springer
137views Database» more  ER 2006»
15 years 4 months ago
Preference Functional Dependencies for Managing Choices
Abstract. The notion of user preference in database modeling has recently received much attention in advanced applications, such as personalization of e-services, since it captures...
Wilfred Ng
EWCBR
2006
Springer
15 years 4 months ago
Case-Base Maintenance for CCBR-Based Process Evolution
The success of a company more and more depends on its ability to flexibly and quickly react to changes. Combining process management techniques and conversational case-based reason...
Barbara Weber, Manfred Reichert, Werner Wild
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
15 years 4 months ago
Genetic algorithms for positioning and utilizing sensors in synthetically generated landscapes
Positioning multiple sensors for acquisition of a a given environment is one of the fundamental research areas in various fields, such as military scouting, computer vision and ro...
Haluk Topcuoglu, Murat Ermis