Sciweavers

1216 search results - page 30 / 244
» Anomaly Detection Using an Ensemble of Feature Models
Sort
View
CAISE
2006
Springer
13 years 11 months ago
Isolated Features Detection in Feature Models
Feature models are commonly used to describe software product lines in terms of features. Features are linked by relations, which may introduce errors in the model. This paper give...
Pablo Trinidad, David Benavides, Antonio Ruiz Cort...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 4 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spooï¬ng in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
CVPR
2009
IEEE
15 years 2 months ago
Convexity and Bayesian Constrained Local Models
The accurate localization of facial features plays a fundamental role in any face recognition pipeline. Constrained local models (CLM) provide an effective approach to localizati...
Ulrich Paquet (Imense Ltd)
TIP
2008
165views more  TIP 2008»
13 years 7 months ago
Activity Modeling Using Event Probability Sequences
Changes in motion properties of trajectories provide useful cues for modeling and recognizing human activities. We associate an event with significant changes that are localized in...
Naresh P. Cuntoor, B. Yegnanarayana, Rama Chellapp...
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 6 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang