Sciweavers

1693 search results - page 121 / 339
» Pattern-Recognition: a Foundational Approach
Sort
View
SAC
2010
ACM
15 years 11 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
120
Voted
CVPR
2009
IEEE
15 years 11 months ago
Symmetric two dimensional linear discriminant analysis (2DLDA)
Linear discriminant analysis (LDA) has been successfully applied into computer vision and pattern recognition for effective feature extraction. High-dimensional objects such as im...
Dijun Luo, Chris H. Q. Ding, Heng Huang
162
Voted
CCS
2009
ACM
15 years 11 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
142
Voted
GIS
2009
ACM
15 years 11 months ago
Proximate sensing using georeferenced community contributed photo collections
Volunteered geographic information such as that available in blogs, wikis, social networking sites, and community contributed photo collections is enabling new applications. This ...
Daniel Leung, Shawn Newsam
166
Voted
CAIP
2009
Springer
200views Image Analysis» more  CAIP 2009»
15 years 11 months ago
Real-Time Stereo Vision: Making More Out of Dynamic Programming
Abstract. Dynamic Programming (DP) is a popular and efficient method for calculating disparity maps from stereo images. It allows for meeting real-time constraints even on low-cos...
Jan Salmen, Marc Schlipsing, Johann Edelbrunner, S...