Sciweavers

457 search results - page 81 / 92
» A Multiple Model Cost-Sensitive Approach for Intrusion Detec...
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 7 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
AIRS
2010
Springer
13 years 4 months ago
Event Recognition from News Webpages through Latent Ingredients Extraction
We investigate the novel problem of event recognition from news webpages. "Events" are basic text units containing news elements. We observe that a news article is always...
Rui Yan, Yu Li, Yan Zhang, Xiaoming Li
CVPR
2005
IEEE
14 years 1 months ago
Audio-Visual Affect Recognition through Multi-Stream Fused HMM for HCI
Advances in computer processing power and emerging algorithms are allowing new ways of envisioning Human Computer Interaction. This paper focuses on the development of a computing...
Zhihong Zeng, Jilin Tu, Brian Pianfetti, Ming Liu,...
AAAI
2008
13 years 9 months ago
Discourse Topic and Gestural Form
Coverbal gesture provides a channel for the visual expression of ideas. While some gestural emblems have culturally predefined forms (e.g., "thumbs up"), the relationshi...
Jacob Eisenstein, Regina Barzilay, Randall Davis
ICCV
1999
IEEE
14 years 9 months ago
Object Recognition from Local Scale-Invariant Features
Proc. of the International Conference on Computer Vision, Corfu (Sept. 1999) An object recognition system has been developed that uses a new class of local image features. The fea...
David G. Lowe