Sciweavers

1804 search results - page 187 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
145
Voted
RAS
2000
187views more  RAS 2000»
15 years 4 months ago
Detection, tracking, and classification of action units in facial expression
Most of the current work on automated facial expression analysis attempt to recognize a small set of prototypic expressions, such as joy and fear. Such prototypic expressions, how...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
IJNSEC
2008
95views more  IJNSEC 2008»
15 years 4 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
BIOINFORMATICS
2011
14 years 11 months ago
Integrative network alignment reveals large regions of global network similarity in yeast and human
Motivation: High-throughput methods for detecting molecular interactions have produced large sets of biological network data with much more yet to come. Analogous to sequence alig...
Oleksii Kuchaiev, Natasa Przulj
CVPR
2007
IEEE
16 years 6 months ago
Euclidean Path Modeling from Ground and Aerial Views
Weaddress the issue ofEuclideanpath mu& ling ina single camerafor activity monitoring in a multi-camera video surveillance system m e paperpmposes a novel linear solufwnro aut...
Imran N. Junejo, Hassan Foroosh
COMPSAC
2005
IEEE
15 years 10 months ago
Parallel Changes: Detecting Semantic Interferences
Parallel changes are a basic fact of modern software development. Where previously we looked at prima facie interference, here we investigate a less direct form that we call seman...
G. Lorenzo Thione, Dewayne E. Perry