Sciweavers

1216 search results - page 66 / 244
» Anomaly Detection Using an Ensemble of Feature Models
Sort
View
IEEEIAS
2008
IEEE
14 years 2 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
IJAIT
2006
121views more  IJAIT 2006»
13 years 7 months ago
An Efficient Feature Selection Algorithm for Computer-aided Polyp Detection
We present an efficient feature selection algorithm for computer aided detection (CAD) computed tomographic (CT) colonography. The algorithm 1) determines an appropriate piecewise...
Jiang Li, Jianhua Yao, Ronald M. Summers, Nicholas...
ICMCS
2005
IEEE
90views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Eye Detection Under Unconstrained Background by the Terrain Feature
Locating eyes in face images is an important step for automatic face analysis and recognition. In this paper, we present a novel approach for eye detection without finding the fa...
Jun Wang, Lijun Yin
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 8 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
ICASSP
2009
IEEE
14 years 2 months ago
Multi-modal activity and dominance detection in smart meeting rooms
In this paper a new approach for activity and dominance modeling in meetings is presented. For this purpose low level acoustic and visual features are extracted from audio and vid...
Benedikt Hörnler, Gerhard Rigoll