Sciweavers

2874 search results - page 480 / 575
» Intrusion Detection: Systems and Models
Sort
View
DAWAK
2008
Springer
15 years 1 months ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit
COLING
2008
15 years 1 months ago
Choosing the Right Translation: A Syntactically Informed Classification Approach
One style of Multi-Engine Machine Translation architecture involves choosing the best of a set of outputs from different systems. Choosing the best translation from an arbitrary s...
Simon Zwarts, Mark Dras
DIMVA
2008
15 years 1 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
MVA
2007
211views Computer Vision» more  MVA 2007»
15 years 1 months ago
Shadow Elimination in Traffic Video Segmentation
Shadow detection is critical for robust and reliable vision-based systems for traffic vision analysis. Shadow points are often misclassified as object points causing errors in loc...
Hong Liu, Jintao Li, Qun Liu, Yueliang Qian
ICVGIP
2004
15 years 1 months ago
Cursive Word Recognition Using a Novel Feature Extraction Method and a Neural Network
In this paper, we present a holistic system for the recognition of cursive handwriting that utilizes a novel feature extraction method and a neural network. The Hough transform is...
José Ruiz-Pinales, René Jaime-Rivas