Sciweavers

1804 search results - page 201 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 9 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu
KI
2008
Springer
15 years 4 months ago
Visual-Based Emotion Detection for Natural Man-Machine Interaction
Abstract. The demand for humanoid robots as service robots for everyday life has increased during the last years. The processing power of the hardware and the development of comple...
Samuel Strupp, Norbert Schmitz, Karsten Berns
ICMCS
2006
IEEE
153views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Learning-Based Interactive Video Retrieval System
This paper presents an interactive video event retrieval system based on improved adaboost learning. This system consists of three main steps. Firstly, a long video sequence is pa...
Chi-Jiunn Wu, Hui-Chi Zeng, Szu-Hao Huang, Shang-H...
125
Voted
NSDI
2004
15 years 6 months ago
SWAP: A Scheduler with Automatic Process Dependency Detection
We have developed SWAP, a system that automatically detects process dependencies and accounts for such dependencies in scheduling. SWAP uses system call history to determine possi...
Haoqiang Zheng, Jason Nieh
ICCS
2007
Springer
15 years 8 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...