Sciweavers

531 search results - page 60 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
RV
2010
Springer
119views Hardware» more  RV 2010»
14 years 12 months ago
LarvaStat: Monitoring of Statistical Properties
Execution paths expose non-functional information such as system reliability and performance, which can be collected using runtime verification techniques. Statistics gathering an...
Christian Colombo, Andrew Gauci, Gordon J. Pace
BMVC
1997
15 years 2 months ago
Color Recognition by Learning: ATR in Color Images
Traditional methods for ATR Automatic Target Recognition use infrared IR sensors for detecting heat emanating fromtargets. IR-based ATR techniques are susceptible to sensor-in...
Shashi D. Buluswar, Bruce A. Draper
MM
2004
ACM
248views Multimedia» more  MM 2004»
15 years 7 months ago
Incremental semi-supervised subspace learning for image retrieval
Subspace learning techniques are widespread in pattern recognition research. They include Principal Component Analysis (PCA), Locality Preserving Projection (LPP), etc. These tech...
Xiaofei He
88
Voted
ICRA
2007
IEEE
117views Robotics» more  ICRA 2007»
15 years 7 months ago
Techniques and Applications for Persistent Backgrounding in a Humanoid Torso Robot
— One of the most basic capabilities for an agent with a vision system is to recognize its own surroundings. Yet surprisingly, despite the ease of doing so, many robots store lit...
David Walker Duhon, Jerod J. Weinman, Erik G. Lear...
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 8 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...