Sciweavers

776 search results - page 94 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
IUI
2005
ACM
15 years 9 months ago
Emotive alert: HMM-based emotion detection in voicemail messages
Voicemail has become an integral part of our personal and professional communication. The number of messages that accumulate in our voice mailboxes necessitate new ways of priorit...
Zeynep Inanoglu, Ron Caneel
ICNS
2009
IEEE
15 years 10 months ago
Advanced Hash Algorithms with Key Bits Duplication for IP Address Lookup
Hashing technique have been widely adopted for various computer network applications such as IP address lookup and intrusion detection, among which XOR-hashing is one of most popu...
Christopher J. Martinez, Wei-Ming Lin
PAM
2005
Springer
15 years 9 months ago
Self-Learning IP Traffic Classification Based on Statistical Flow Characteristics
A number of key areas in IP network engineering, management and surveillance greatly benefit from the ability to dynamically identify traffic flows according to the applications re...
Sebastian Zander, Thuy T. T. Nguyen, Grenville J. ...
ACSW
2006
15 years 5 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
IJCV
2000
136views more  IJCV 2000»
15 years 3 months ago
A Trainable System for Object Detection
This paper presents a general, trainable system for object detection in unconstrained, cluttered scenes. The system derives much of its power from a representation that describes a...
Constantine Papageorgiou, Tomaso Poggio