Sciweavers

103 search results - page 10 / 21
» Anomaly Detection through Registration
Sort
View
TSMC
2011
228views more  TSMC 2011»
13 years 1 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...
ICVS
2009
Springer
13 years 4 months ago
Automatic Classification of Image Registration Problems
This paper introduces a system that automatically classifies registration problems based on the type of registration required. Rather than rely on a single "best" algorit...
Steve Oldridge, Gregor Miller, Sidney Fels
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 6 months ago
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation ...
Julie Greensmith, Jan Feyereisl, Uwe Aickelin
ICIP
2007
IEEE
14 years 8 months ago
A Multi-Layer MRF Model for Object-Motion Detection in Unregistered Airborne Image-Pairs
In this paper, we give a probabilistic model for automatic change detection on airborne images taken with moving cameras. To ensure robustness, we adopt an unsupervised coarse mat...
Csaba Benedek, Tamas Sziranyi, Zoltan Kato, and Jo...
NETWORKING
2004
13 years 8 months ago
On Detection of Anomalous Routing Dynamics in BGP
BGP, the de facto inter-domain routing protocol, is the core component of current Internet infrastructure. BGP traffic deserves thorough exploration, since abnormal BGP routing dy...
Ke Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, ...