Sciweavers

6318 search results - page 142 / 1264
» Data Leakage Detection
Sort
View
ICASSP
2008
IEEE
15 years 11 months ago
Low-complexity receivers for multiuser detection with an unknown number of active users
In multiuser detection, the set of users active at any time may be unknown to the receiver. A two-step detection procedure, in which multiuser detection is preceded by active-user...
Daniele Angelosante, Ezio Biglieri
ICMCS
2006
IEEE
98views Multimedia» more  ICMCS 2006»
15 years 10 months ago
A Two-Layer Graphical Model for Combined Video Shot and Scene Boundary Detection
In this work we present a novel two-layer hybrid Graphical model for combined shot and scene boundary detection in videos. In the first layer of the model, low-level features are...
Marc Al-Hames, Stefan Zettl, Frank Wallhoff, Steph...
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
15 years 6 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
ICONIP
2004
15 years 6 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
152
Voted
IC3
2009
15 years 2 months ago
Local Subspace Based Outlier Detection
Abstract. Existing studies in outlier detection mostly focus on detecting outliers in full feature space. But most algorithms tend to break down in highdimensional feature spaces b...
Ankur Agrawal