Sciweavers

323 search results - page 25 / 65
» Alert Detection in System Logs
Sort
View
RAID
2009
Springer
14 years 3 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
ASPLOS
2006
ACM
14 years 2 months ago
Supporting nested transactional memory in logTM
Nested transactional memory (TM) facilitates software composition by letting one module invoke another without either knowing whether the other uses transactions. Closed nested tr...
Michelle J. Moravan, Jayaram Bobba, Kevin E. Moore...
IJCV
2000
162views more  IJCV 2000»
13 years 8 months ago
Visual Surveillance for Moving Vehicles
An overview is given of a novel vision system for locating, recognising and tracking multiple vehicles, using a single monocular camera mounted on a moving vehicle1 . 3D model-bas...
James M. Ferryman, Stephen J. Maybank, Anthony D. ...
MOBISYS
2008
ACM
14 years 8 months ago
Peopletones: a system for the detection and notification of buddy proximity on mobile phones
Mobile phones have the potential to be useful agents for their owners by detecting and reporting situations that are of interest. Several challenges emerge in the case of detectin...
Kevin A. Li, Timothy Sohn, Steven Huang, William G...
ITS
2010
Springer
128views Multimedia» more  ITS 2010»
14 years 13 days ago
Can Affect Be Detected from Intelligent Tutoring System Interaction Data? - A Preliminary Study
This study attempted to determine if it is possible to create an automatic affect detector using a combination of semantic and keystroke data. While the resulting models attained d...
Elizabeth A. Anglo, Ma. Mercedes T. Rodrigo