Sciweavers

50 search results - page 6 / 10
» Business process impact visualization and anomaly detection
Sort
View
KBS
2008
110views more  KBS 2008»
13 years 7 months ago
Intensity-based image registration using multiple distributed agents
Image registration is the process of geometrically aligning images taken from different sensors, viewpoints or instances in time. It plays a key role in the detection of defects o...
Roger J. Tait, Gerald Schaefer, Adrian A. Hopgood
CN
2008
128views more  CN 2008»
13 years 7 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ICIP
2010
IEEE
13 years 5 months ago
Multiplexed clustered-dot halftone watermarks using bi-directional phase modulation and detection
We present a method for embedding and detection of visual watermark patterns in printed images that use clustered-dot halftones in the printing process. The method allows two inde...
Basak Oztan, Gaurav Sharma
JIDM
2010
90views more  JIDM 2010»
13 years 2 months ago
A Context-Dependent Supervised Learning Approach to Sentiment Detection in Large Textual Databases
Sentiment detection automatically identifies emotions in textual data. The increasing amount of emotive documents available in corporate databases and on the World Wide Web calls f...
Albert Weichselbraun, Stefan Gindl, Arno Scharl
ASPLOS
2010
ACM
14 years 2 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli