Sciweavers

531 search results - page 85 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
LREC
2010
160views Education» more  LREC 2010»
15 years 2 months ago
Construction of Back-Channel Utterance Corpus for Responsive Spoken Dialogue System Development
In spoken dialogues, if a spoken dialogue system does not respond at all during user's utterances, the user might feel uneasy because the user does not know whether or not th...
Yuki Kamiya, Tomohiro Ohno, Shigeki Matsubara, Hid...
CVPR
2007
IEEE
16 years 3 months ago
Capturing People in Surveillance Video
This paper presents reliable techniques for detecting, tracking, and storing keyframes of people in surveillance video. The first component of our system is a novel face detector ...
Rogerio Feris, Ying-li Tian, Arun Hampapur
DIMVA
2008
15 years 2 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
CSFW
2007
IEEE
15 years 7 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
IJCNN
2008
IEEE
15 years 7 months ago
Hybrid learning architecture for unobtrusive infrared tracking support
—The system architecture presented in this paper is designed for helping an aged person to live longer independently in their own home by detecting unusual and potentially hazard...
K. K. Kiran Bhagat, Stefan Wermter, Kevin Burn