Sciweavers

1009 search results - page 173 / 202
» Region-based face detection
Sort
View
ICML
2007
IEEE
15 years 10 months ago
Asymmetric boosting
A cost-sensitive extension of boosting, denoted as asymmetric boosting, is presented. Unlike previous proposals, the new algorithm is derived from sound decision-theoretic princip...
Hamed Masnadi-Shirazi, Nuno Vasconcelos
KDD
2003
ACM
148views Data Mining» more  KDD 2003»
15 years 10 months ago
Mining concept-drifting data streams using ensemble classifiers
Recently, mining data streams with concept drifts for actionable insights has become an important and challenging task for a wide range of applications including credit card fraud...
Haixun Wang, Wei Fan, Philip S. Yu, Jiawei Han
ACSAC
2009
IEEE
15 years 4 months ago
Online Signature Generation for Windows Systems
—In this paper, we present a new, light-weight approach for generating filters for blocking buffer overflow attacks on Microsoft Windows systems. It is designed to be deployabl...
Lixin Li, James E. Just, R. Sekar
83
Voted
AVSS
2009
IEEE
15 years 4 months ago
Clustered Synopsis of Surveillance Video
—Millions of surveillance cameras record video around the clock, producing huge video archives. Even when a video archive is known to include critical activities, finding them i...
Yael Pritch, Sarit Ratovitch, Avishai Hendel, Shmu...
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
15 years 4 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash