Sciweavers

1804 search results - page 117 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ICCV
2003
IEEE
16 years 3 days ago
Using Temporal Coherence to Build Models of Animals
This paper describes a system that can build appearance models of animals automatically from a video sequence of the relevant animal with no explicit supervisory information. The ...
Deva Ramanan, David A. Forsyth
WSC
2007
15 years 15 days ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
DAGSTUHL
2003
14 years 11 months ago
Some Methodological Observations Resulting from Experience Using LSCs and the Play-In/Play-Out Approach
The play-in/play-out approach is a method for specifying and developing complex reactive systems. It is built upon a scenariobased philosophy, and uses the language of live sequenc...
David Harel, Hillel Kugler, Gera Weiss
100
Voted
FECS
2006
113views Education» more  FECS 2006»
14 years 11 months ago
A Lightweight Program Similarity Detection Model using XML and Levenshtein Distance
Program plagiarism is one of the most significant problems in Computer Science education. Most common plagiarism includes modifying comments, reordering statements, and changing v...
Seo-Young Noh, Sangwoo Kim, Cheonyoung Jung
ICRA
2009
IEEE
141views Robotics» more  ICRA 2009»
15 years 4 months ago
Detecting repeated motion patterns via Dynamic Programming using motion density
— In this paper, we propose a method that detects repeated motion patterns in a long motion sequence efficiently. Repeated motion patterns are the structured information that ca...
Koichi Ogawara, Yasufumi Tanabe, Ryo Kurazume, Tsu...