Sciweavers

343 search results - page 32 / 69
» Normal State Implicature
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 1 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
INFOCOM
1994
IEEE
15 years 1 months ago
A Self-Clocked Fair Queueing Scheme for Broadband Applications
A n eficient fair queueing scheme which is feasible for broadband implementation is proposed and its performance is analyzed. We define fairness in a selfcontained manner, elimina...
S. Jamaloddin Golestani
COST
2009
Springer
205views Multimedia» more  COST 2009»
15 years 1 months ago
Ergodic HMM-UBM System for On-Line Signature Verification
Abstract. We propose a novel approach for on-line signature verification based on building HMM user models by adapting an ergodic Universal Background Model (UBM). State initializa...
Enrique Argones-Rúa, David Pérez-Pi&...
91
Voted
ICDM
2007
IEEE
156views Data Mining» more  ICDM 2007»
15 years 1 months ago
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
This paper addresses the task of change analysis of correlated multi-sensor systems. The goal of change analysis is to compute the anomaly score of each sensor when we know that t...
Tsuyoshi Idé, Spiros Papadimitriou, Michail...
CLEF
2004
Springer
15 years 1 months ago
UB at CLEF2004: Cross Language Information Retrieval Using Statistical Language Models
This paper presents the results of the State University of New York at Buffalo (UB) in the Mono-lingual and Multi-lingual tasks at CLEF 2004. For these tasks we used an approach ba...
Miguel E. Ruiz, Munirathnam Srikanth