Sciweavers

972 search results - page 181 / 195
» Active Learning with Generalized Queries
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 8 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
TEI
2010
ACM
160views Hardware» more  TEI 2010»
14 years 2 months ago
Think globally, build locally: a technological platform for low-cost, open-source, locally-assembled programmable bricks for edu
“Programmable bricks” are microcontroller-based devices that can be used in various educational projects, such as robotic prototypes, environmental sensing, and interactive ar...
Arnan Sipitakiat, Paulo Blikstein
CCS
2007
ACM
14 years 1 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
CIVR
2007
Springer
144views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Image retrieval on large-scale image databases
Online image repositories such as Flickr contain hundreds of millions of images and are growing quickly. Along with that the needs for supporting indexing, searching and browsing ...
Eva Hörster, Rainer Lienhart, Malcolm Slaney
CIVR
2007
Springer
210views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Semantic video analysis for psychological research on violence in computer games
In this paper, we present an automatic semantic video analysis system to support interdisciplinary research efforts in the field of psychology and media science. The psychological...
Markus Mühling, Ralph Ewerth, Thilo Stadelman...