Sciweavers

868 search results - page 124 / 174
» Using concept analysis to detect co-change patterns
Sort
View
128
Voted
IPCCC
2006
IEEE
15 years 9 months ago
Connectionless port scan detection on the backbone
Considerable research has been done on detecting and blocking portscan activities that are typically conducted by infected hosts to discover other vulnerable hosts. However, the f...
Avinash Sridharan, Tao Ye, Supratik Bhattacharyya
138
Voted
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
15 years 5 months ago
Active Mining of Data Streams
Most previously proposed mining methods on data streams make an unrealistic assumption that "labelled" data stream is readily available and can be mined at anytime. Howe...
Wei Fan, Yi-an Huang, Haixun Wang, Philip S. Yu
122
Voted
COMPSAC
2006
IEEE
15 years 9 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
184
Voted
ACCV
2010
Springer
14 years 10 months ago
Spatiotemporal Closure
Spatiotemporal segmentation is an essential task for video analysis. The strong interconnection between finding an object's spatial support and finding its motion characterist...
Alex Levinshtein, Cristian Sminchisescu, Sven J. D...
159
Voted
VIS
2009
IEEE
215views Visualization» more  VIS 2009»
16 years 4 months ago
Iconizer: A Framework to Identify and Create Effective Representations for Visual Information Encoding
concept form search query vision confirm consensus refine search query graphics VIE-designer image objects image objects Visual Sign (VIE) run search query words images Iconizer:...
Supriya Garg, Tamara Berg, Klaus Mueller