Sciweavers

182 search results - page 25 / 37
» Classification Using Multiple and Negative Target Rules
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
AIRWEB
2007
Springer
13 years 11 months ago
Measuring Similarity to Detect Qualified Links
The early success of link-based ranking algorithms was predicated on the assumption that links imply merit of the target pages. However, today many links exist for purposes other ...
Xiaoguang Qi, Lan Nie, Brian D. Davison
CIVR
2004
Springer
248views Image Analysis» more  CIVR 2004»
13 years 11 months ago
Automated Person Identification in Video
Abstract. We describe progress in the automatic detection and identification of humans in video, given a minimal number of labelled faces as training data. This is an extremely cha...
Mark Everingham, Andrew Zisserman
ENGL
2008
116views more  ENGL 2008»
13 years 7 months ago
A Low Cost Machine Translation Method for Cross-Lingual Information Retrieval
In one form or another language translation is a necessary part of cross-lingual information retrieval systems. Often times this is accomplished using machine translation systems....
David B. Bracewell, Fuji Ren, Shingo Kuroiwa
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto