Sciweavers

2072 search results - page 301 / 415
» Applications of Independent Component Analysis
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 9 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
ICCD
2004
IEEE
123views Hardware» more  ICCD 2004»
14 years 5 months ago
Software/Network Co-Simulation of Heterogeneous Industrial Networks Architectures
The work presents a modeling and analysis framework for heterogeneous industrial networks architectures which is based on a tight integration of a network simulator with embedded ...
Franco Fummi, Stefano Martini, Marco Monguzzi, Gio...
WWW
2010
ACM
14 years 3 months ago
The social honeypot project: protecting online communities from spammers
We present the conceptual framework of the Social Honeypot Project for uncovering social spammers who target online communities and initial empirical results from Twitter and MySp...
Kyumin Lee, James Caverlee, Steve Webb
ICMCS
2007
IEEE
223views Multimedia» more  ICMCS 2007»
14 years 3 months ago
An Effective Local Invariant Descriptor Combining Luminance and Color Information
Extraction of stable local invariant features is very important in many computer vision applications, such as image matching, object recognition and image retrieval. Most existing...
Dong Zhang, Weiqiang Wang, Wen Gao, Shuqiang Jiang
CCECE
2006
IEEE
14 years 2 months ago
A Modular Distributed Video Surveillance System Over IP
We present an automated and distributed real-time video surveillance system which can be used for the detection of objects and events in a wide range of applications. Video feeds ...
Drew Ostheimer, Sebastien Lemay, Mohammed Ghazal, ...