Sciweavers

98 search results - page 18 / 20
» Cat face detection with two heterogeneous features
Sort
View
TMA
2010
Springer
140views Management» more  TMA 2010»
13 years 5 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
JMLR
2006
147views more  JMLR 2006»
13 years 7 months ago
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images
In recent years anti-spam filters have become necessary tools for Internet service providers to face up to the continuously growing spam phenomenon. Current server-side anti-spam ...
Giorgio Fumera, Ignazio Pillai, Fabio Roli
IJCV
2007
196views more  IJCV 2007»
13 years 7 months ago
Weakly Supervised Scale-Invariant Learning of Models for Visual Recognition
We investigate a method for learning object categories in a weakly supervised manner. Given a set of images known to contain the target category from a similar viewpoint, learning...
Robert Fergus, Pietro Perona, Andrew Zisserman
DEBU
1998
115views more  DEBU 1998»
13 years 7 months ago
The Case for Non-transparent Replication: Examples from Bayou
Applications that rely on replicated data have different requirements for how their data is managed. For example, some applications may require that updates propagate amongst repl...
Douglas B. Terry, Karin Petersen, Mike Spreitzer, ...