Sciweavers

12 search results - page 2 / 3
» Posterior-based confidence measures for spoken term detectio...
Sort
View
ACMSE
2005
ACM
15 years 3 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ACL
2008
14 years 11 months ago
A Critical Reassessment of Evaluation Baselines for Speech Summarization
We assess the current state of the art in speech summarization, by comparing a typical summarizer on two different domains: lecture data and the SWITCHBOARD corpus. Our results ca...
Gerald Penn, Xiaodan Zhu
CLEF
2009
Springer
14 years 7 months ago
Exploiting Speech Recognition Transcripts for Narrative Peak Detection in Short-Form Documentaries
Narrative peaks are points at which the viewer perceives a spike in the level of dramatic tension within the narrative flow of a video. This paper reports on four approaches to na...
Martha Larson, Bart Jochems, Ewine Smits, Roeland ...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
15 years 10 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
ICSE
2008
IEEE-ACM
15 years 10 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev