Sciweavers

1265 search results - page 141 / 253
» Better Burst Detection
Sort
View
113
Voted
ACSAC
2004
IEEE
15 years 7 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
124
Voted
CP
2004
Springer
15 years 7 months ago
Full Dynamic Substitutability by SAT Encoding
Symmetry in constraint problems can be exploited to greatly improve search performance. A form of symmetry that has been the subject of considerable research is value interchangeab...
Steven David Prestwich
131
Voted
EVOW
2006
Springer
15 years 7 months ago
Human Papillomavirus Risk Type Classification from Protein Sequences Using Support Vector Machines
Infection by the human papillomavirus (HPV) is associated with the development of cervical cancer. HPV can be classified to highand low-risk type according to its malignant potenti...
Sun Kim, Byoung-Tak Zhang
135
Voted
ECCV
2010
Springer
15 years 7 months ago
Discovering Multipart Appearance Models from Captioned Images
Abstract. Even a relatively unstructured captioned image set depicting a variety of objects in cluttered scenes contains strong correlations between caption words and repeated visu...
108
Voted
BMVC
2001
15 years 6 months ago
Deformable Spatio-Temporal Shape Models: Extending ASM to 2D+Time
This paper extends 2D Active Shape Models to 2D+time by presenting a method for modelling and segmenting spatio-temporal shapes (ST-shapes). The modelling part consists of constru...
Ghassan Hamarneh, Tomas Gustavsson