Sciweavers

872 search results - page 83 / 175
» Automatic Generation of Detection Algorithms for Design Defe...
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
CIVR
2008
Springer
166views Image Analysis» more  CIVR 2008»
13 years 10 months ago
Non-negative matrix factorisation for object class discovery and image auto-annotation
In information retrieval, sub-space techniques are usually used to reveal the latent semantic structure of a data-set by projecting it to a low dimensional space. Non-negative mat...
Jiayu Tang, Paul H. Lewis
TNN
2010
148views Management» more  TNN 2010»
13 years 3 months ago
A fast algorithm for robust mixtures in the presence of measurement errors
Abstract--In experimental and observational sciences, detecting atypical, peculiar data from large sets of measurements has the potential of highlighting candidates of interesting ...
Jianyong Sun, Ata Kabán
FGR
2002
IEEE
151views Biometrics» more  FGR 2002»
14 years 1 months ago
Fast Stereo-Based Head Tracking for Interactive Environments
We present a robust implementation of stereo-based head tracking designed for interactive environments with uncontrolled lighting. We integrate fast face detection and drift reduc...
Louis-Philippe Morency, Ali Rahimi, Neal Checka, T...
DSN
2004
IEEE
14 years 20 days ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda