Sciweavers

587 search results - page 73 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
CINQ
2004
Springer
189views Database» more  CINQ 2004»
14 years 3 months ago
Employing Inductive Databases in Concrete Applications
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...
TSD
2010
Springer
13 years 8 months ago
Recovery of Rare Words in Lecture Speech
The vocabulary used in speech usually consists of two types of words: a limited set of common words, shared across multiple documents, and a virtually unlimited set of rare words, ...
Stefan Kombrink, Mirko Hannemann, Lukas Burget, Hy...
ECCV
2010
Springer
14 years 20 days ago
Depth-Encoded Hough Voting for joint object detection and shape recovery
Detecting objects, estimating their pose and recovering 3D shape information is a critical problem in many vision and robotics applications. This paper addresses the above needs by...
AMM
2011
118views more  AMM 2011»
13 years 5 months ago
From Community Detection to Mentor Selection in Rating-Free Collaborative Filtering
—The number of resources or items that users can now access when navigating on the Web or using e-services, is so huge that these might feel lost due to the presence of too much ...
Armelle Brun, Sylvain Castagnos, Anne Boyer
ICAI
2004
13 years 11 months ago
Using Fuzzy Clustering for Real-time Space Flight Safety
To ensure space flight safety, it is necessary to monitor myriad sensor readings on the ground and in flight. Since a space shuttle has many sensors, monitoring data and drawing c...
Charles Lee, Darrin M. Hanna, Richard E. Haskell, ...