Sciweavers

213 search results - page 4 / 43
» Benchmarking Anomaly-Based Detection Systems
Sort
View
IPCCC
2007
IEEE
14 years 2 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
ICDAR
2003
IEEE
14 years 1 months ago
Evaluating SEE - A Benchmarking System for Document Page Segmentation
The decomposition of a document into segments such as text regions and graphics is a significant part of the document analysis process. The basic requirement for rating and impro...
Stefan Agne, Andreas Dengel, Bertin Klein
ICDAR
1995
IEEE
14 years 2 days ago
Ground-truthing and benchmarking document page segmentation
We describe a new approach for evaluating page segmentation algorithms. Unlike techniques that rely on OCR output, our method is region-based: the segmentation output, described a...
Berrin A. Yanikoglu, Luc Vincent
TRECVID
2008
13 years 10 months ago
IBM Research TRECVID-2008 Video Retrieval System
In this paper, we describe the IBM Research system for indexing, analysis, and retrieval of video as applied to the TREC-2008 video retrieval benchmark. This year, focus of the sy...
Apostol Natsev, John R. Smith, Jelena Tesic, Lexin...
JORS
2010
134views more  JORS 2010»
13 years 3 months ago
An overview and framework for PD backtesting and benchmarking
In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation can be conside...
G. Castermans, David Martens, Tony Van Gestel, B. ...