Sciweavers

588 search results - page 58 / 118
» Activity rhythm detection and modeling
Sort
View
ICPR
2010
IEEE
14 years 1 months ago
Malware Detection on Mobile Devices Using Distributed Machine Learning
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
ECCV
2010
Springer
14 years 1 months ago
Anomalous Behaviour Detection using Spatiotemporal Oriented Energies, Subset Inclusion Histogram Comparison and Event-Driven Pro
Abstract. This paper proposes a novel approach to anomalous behaviour detection in video. The approach is comprised of three key components. First, distributions of spatiotemporal ...
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 10 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
ISBI
2004
IEEE
14 years 10 months ago
Outlier Detection for Robust Region-Based Estimation of the Hemodynamic Response Function in Event-Related fMRI
In functional Magnetic Resonance Imaging (fMRI), the Hemodynamic Response Function (HRF) represents the impulse response of the neurovascular system. Its identification is essenti...
Philippe Ciuciu, Alexis Roche, Jérôme...
FGR
2008
IEEE
176views Biometrics» more  FGR 2008»
14 years 4 months ago
Learning image alignment without local minima for face detection and tracking
Active Appearance Models (AAMs) have been extensively used for face alignment during the last 20 years. While AAMs have numerous advantages relative to alternate approaches, they ...
Minh Hoai Nguyen, Fernando De la Torre