Sciweavers

321 search results - page 49 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Combining HMM-based melody extraction and NMF-based soft masking for separating voice and accompaniment from monaural audio
Modern monaural voice and accompaniment separation systems usually consist of two main modules: melody extraction and timefrequency masking. A main distinction between different s...
Yun Wang, Zhijian Ou
ICIP
2007
IEEE
15 years 3 months ago
Propagating Image-Level Part Statistics to Enhance Object Detection
The bag-of-words approach has become increasingly attractive in the fields of object category recognition and scene classification, witnessed by some successful applications [5, 7...
Sheng Gao, Joo-Hwee Lim, Qibin Sun
89
Voted
IEEEPACT
2007
IEEE
15 years 3 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan
89
Voted
IEEEVAST
2010
14 years 4 months ago
Anomaly detection in GPS data based on visual analytics
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
Zicheng Liao, Yizhou Yu, Baoquan Chen
85
Voted
ETRICS
2006
15 years 1 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...