Sciweavers

1804 search results - page 144 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
DSD
2009
IEEE
93views Hardware» more  DSD 2009»
15 years 2 months ago
Transactions Sequence Tracking by means of Dynamic Binary Instrumentation of TLM Models
Several traditional VHDL fault injection mechanisms like mutants or saboteurs have been adapted to SystemC model descriptions. The main drawback of these approaches is the necessi...
Antonio da Silva, Sebastian Sanchez
LREC
2010
156views Education» more  LREC 2010»
15 years 5 months ago
Estimation Method of User Satisfaction Using N-gram-based Dialog History Model for Spoken Dialog System
In this paper, we propose an estimation method of user satisfaction for a spoken dialog system using an N-gram-based dialog history model. We have collected a large amount of spok...
Sunao Hara, Norihide Kitaoka, Kazuya Takeda
COMCOM
2002
120views more  COMCOM 2002»
15 years 4 months ago
An interactive video delivery and caching system using video summarization
With the advance of high-speed network technologies, the availability and popularity of streaming media content over the Internet has grown rapidly in recent years. The delivery a...
Sung-Ju Lee, Wei-Ying Ma, Bo Shen
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
16 years 4 months ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 4 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...