Sciweavers

458 search results - page 69 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
IPM
2008
115views more  IPM 2008»
13 years 9 months ago
Adapting information retrieval systems to user queries
Users enter queries that are short as well as long. The aim of this work is to evaluate techniques that can enable information retrieval (IR) systems to automatically adapt to per...
Giridhar Kumaran, James Allan
USENIX
2007
14 years 4 days ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
AUSAI
2005
Springer
14 years 3 months ago
Automated Scene Understanding for Airport Aprons
Abstract. This paper presents a complete visual surveillance system for automatic scene interpretation of airport aprons. The system comprises two main modules — Scene Tracking a...
James M. Ferryman, Mark Borg, David Thirde, Floren...
ICAIL
2009
ACM
14 years 4 months ago
Query-based opinion summarization for legal blog entries
We present the first report of automatic sentiment summarization in the legal domain. This work is based on processing a set of legal questions with a system consisting of a semi...
Jack G. Conrad, Jochen L. Leidner, Frank Schilder,...
PAMI
2012
12 years 7 days ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain