Sciweavers

2236 search results - page 145 / 448
» Intrusion detection techniques and approaches
Sort
View
EACL
2003
ACL Anthology
14 years 11 months ago
Detecting Errors in Part-of-Speech Annotation
We propose a new method for detecting errors in “gold-standard” part-ofspeech annotation. The approach locates errors with high precision based on n-grams occurring in the cor...
Markus Dickinson, Detmar Meurers
WCRE
2000
IEEE
15 years 2 months ago
Revisiting the Delta IC Approach to Component Recovery
Component recovery supports program understanding, architecture recovery, and re-use. Among the best known techniques for detection of re-usable objects (related global variables ...
Gerardo Canfora, Jörg Czeranski, Rainer Kosch...
ICASSP
2011
IEEE
14 years 2 months ago
A region based approach to background modeling in a wavelet multi-resolution framework
In the field of detection and monitoring of dynamic objects in quasi-static scenes, background subtraction techniques where background is modeled at pixel-level, although showing ...
Ainhoa Mendizabal, Luis Salgado
KAIS
2007
112views more  KAIS 2007»
14 years 10 months ago
The pairwise attribute noise detection algorithm
Analyzing the quality of data prior to constructing data mining models is emerging as an important issue. Algorithms for identifying noise in a given data set can provide a good me...
Jason Van Hulse, Taghi M. Khoshgoftaar, Haiying Hu...
105
Voted
SDM
2003
SIAM
184views Data Mining» more  SDM 2003»
14 years 11 months ago
Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data
The problem of finding clusters in data is challenging when clusters are of widely differing sizes, densities and shapes, and when the data contains large amounts of noise and out...
Levent Ertöz, Michael Steinbach, Vipin Kumar