Sciweavers

345 search results - page 61 / 69
» Using Active Learning in Intrusion Detection
Sort
View
94
Voted
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
15 years 11 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
ICASSP
2011
IEEE
14 years 2 months ago
A fully automated 2-DE gel image analysis pipeline for high throughput proteomics
Image analysis is still considered as the bottleneck in 2D-gel based expression proteomics analysis for biomarkers discovery. We are presenting a new end-to-end image analysis pip...
Panagiotis Tsakanikas, Elias S. Manolakos
MHCI
2004
Springer
15 years 3 months ago
Mobile Context Aware Systems: The Intelligence to Support Tasks and Effectively Utilise Resources
: The complex usage of mobile devices coupled with their limited resources in terms of display and processing suggests that being able to understand the context of the user would b...
Russell Beale, Peter Lonsdale
UIST
2006
ACM
15 years 4 months ago
Using a low-cost electroencephalograph for task classification in HCI research
Modern brain sensing technologies provide a variety of methods for detecting specific forms of brain activity. In this paper, we present an initial step in exploring how these tec...
Johnny Chung Lee, Desney S. Tan
ICSM
2006
IEEE
15 years 4 months ago
Using the Case-Based Ranking Methodology for Test Case Prioritization
The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most ...
Paolo Tonella, Paolo Avesani, Angelo Susi