Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
Abstract. This paper proposes a new vision-based system that can extract walking parameters from human demonstration. The system uses only a non-calibrated USB webcam connected to ...
Juan Pedro Bandera Rubio, Changjiu Zhou, Francisco...
Abstract. This paper investigates the efficiency of in-door next location prediction by comparing several prediction methods. The scenario concerns people in an office building vis...
Jan Petzold, Andreas Pietzowski, Faruk Bagci, Wolf...
Abstract. We introduce nondeterministic graph searching with a controlled amount of nondeterminism and show how this new tool can be used in algorithm design and combinatorial anal...
Abstract. Kernel based methods (such as k-nearest neighbors classifiers) for AI tasks translate the classification problem into a proximity search problem, in a space that is usu...