Sciweavers

106 search results - page 15 / 22
» Normalized Gaussian Networks with Mixed Feature Data
Sort
View
ICPR
2008
IEEE
15 years 10 months ago
Dynamic target classification in wireless sensor networks
Feature extraction and classification are two important components in pattern recognition. In this paper, we propose dynamic target classification in WSNs. The main idea of this a...
Ying Sun, Hairong Qi
INFOCOM
2007
IEEE
15 years 3 months ago
Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares
— High-speed backbones are regularly affected by various kinds of network anomalies, ranging from malicious attacks to harmless large data transfers. Different types of anomalies...
Tarem Ahmed, Mark Coates, Anukool Lakhina
ICASSP
2010
IEEE
14 years 9 months ago
The IBM 2008 GALE Arabic speech transcription system
This paper describes the Arabic broadcast transcription system fielded by IBM in the GALE Phase 3.5 machine translation evaluation. Key advances compared to our Phase 2.5 system ...
George Saon, Hagen Soltau, Upendra Chaudhari, Step...
RAID
2001
Springer
15 years 1 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 1 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok