Sciweavers

470 search results - page 55 / 94
» Test Case Generation Based on State and Activity Models
Sort
View
100
Voted
CCS
2004
ACM
15 years 5 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
185
Voted
ICOM
2011
14 years 4 months ago
A Context-Aware Proactive Controller for Smart Environments
In this paper we describe an implicit user interface for smart environment control: We make our system guess how to assist the user(s) proactively. Our controller is based on two ...
Frank Krüger, Gernot Ruscher, Sebastian Bader...
KDD
2003
ACM
266views Data Mining» more  KDD 2003»
16 years 27 days ago
Applying data mining in investigating money laundering crimes
In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- th...
Zhongfei (Mark) Zhang, John J. Salerno, Philip S. ...
91
Voted
VL
2008
IEEE
115views Visual Languages» more  VL 2008»
15 years 6 months ago
Flexible visualization of automatic simulation based on structured graph transformation
Visual modeling languages for discrete behavior modeling allow the modeler to describe how systems develop over time during system runs. Models of these languages are the basis fo...
Enrico Biermann, Claudia Ermel, Jonas Hurrelmann, ...
126
Voted
IJPRAI
2008
235views more  IJPRAI 2008»
15 years 15 days ago
Shape-Based Individual/Group Detection for Sport Videos Categorization
We present a shape based method for automatic people detection and counting without any assumption or knowledge of camera motion. The proposed method is applied to athletic videos...
Costas Panagiotakis, Emmanuel Ramasso, Georgios Tz...