Sciweavers

128 search results - page 24 / 26
» Approaches to automatic lexicon learning with limited traini...
Sort
View
ISMIS
2005
Springer
14 years 27 days ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
PRICAI
2010
Springer
13 years 5 months ago
Layered Hypernetwork Models for Cross-Modal Associative Text and Image Keyword Generation in Multimodal Information Retrieval
Conventional methods for multimodal data retrieval use text-tag based or cross-modal approaches such as tag-image co-occurrence and canonical correlation analysis. Since there are ...
JungWoo Ha, Byoung-Hee Kim, Bado Lee, Byoung-Tak Z...
GECCO
2010
Springer
155views Optimization» more  GECCO 2010»
14 years 6 days ago
Negative selection algorithms without generating detectors
Negative selection algorithms are immune-inspired classifiers that are trained on negative examples only. Classification is performed by generating detectors that match none of ...
Maciej Liskiewicz, Johannes Textor
CVPR
2010
IEEE
14 years 3 months ago
Segmenting Video Into Classes of Algorithm-Suitability
Given a set of algorithms, which one(s) should you apply to, i) compute optical flow, or ii) perform feature matching? Would looking at the sequence in question help you decide? I...
Oisin Mac Aodha, Gabriel Brostow, marc Pollefeys
ECCV
2008
Springer
13 years 9 months ago
Unsupervised Classification and Part Localization by Consistency Amplification
We present a novel method for unsupervised classification, including the discovery of a new category and precise object and part localization. Given a set of unlabelled images, som...
Leonid Karlinsky, Michael Dinerstein, Dan Levi, Sh...