Sciweavers

1274 search results - page 162 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
ICCV
2011
IEEE
14 years 4 months ago
Learning a Category Independent Object Detection Cascade
Cascades are a popular framework to speed up object detection systems. Here we focus on the first layers of a category independent object detection cascade in which we sample a l...
Esa Rahtu, Juho Kannala, Matthew Blaschko
KDD
2002
ACM
149views Data Mining» more  KDD 2002»
16 years 4 months ago
A system for real-time competitive market intelligence
A method is described for real-time market intelligence and competitive analysis. News stories are collected online for a designated group of companies. The goal is to detect crit...
Sholom M. Weiss, Naval K. Verma
JCST
2011
89views more  JCST 2011»
14 years 11 months ago
Software Defect Detection with Rocus
Software defect detection aims to automatically identify defective software modules for efficient software test in order to improve the quality of a software system. Although many...
Yuan Jiang, Ming Li, Zhi-Hua Zhou
AI
2006
Springer
15 years 8 months ago
Adaptive Fraud Detection Using Benford's Law
Abstract. Adaptive Benford's Law [1] is a digital analysis technique that specifies the probabilistic distribution of digits for many commonly occurring phenomena, even for in...
Fletcher Lu, J. Efrim Boritz, H. Dominic Covvey
BMCBI
2010
129views more  BMCBI 2010»
15 years 4 months ago
LAITOR - Literature Assistant for Identification of Terms co-Occurrences and Relationships
Background: Biological knowledge is represented in scientific literature that often describes the function of genes/ proteins (bioentities) in terms of their interactions (biointe...
Adriano Barbosa-Silva, Theodoros G. Soldatos, Ivan...