Sciweavers

1621 search results - page 75 / 325
» Detecting Experiences from Weblogs
Sort
View
DSN
2003
IEEE
14 years 2 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
ICSM
1995
IEEE
14 years 24 days ago
Detecting interleaving
The various goals and requirements of a system are realized in software as fragments of code that are typically \interleaved" in that they may be woven together in the same c...
Spencer Rugaber, Kurt Stirewalt, Linda M. Wills
ICIP
2010
IEEE
13 years 7 months ago
Video anomaly detection in spatiotemporal context
Compared to other approaches that analyze object trajectories, we propose to detect anomalous video events at three levels considering spatiotemporal context of video objects, i.e...
Fan Jiang, Junsong Yuan, Sotirios A. Tsaftaris, Ag...
IEAAIE
2010
Springer
13 years 7 months ago
A Study of Detecting Computer Viruses in Real-Infected Files in the n-Gram Representation with Machine Learning Methods
Abstract. Machine learning methods were successfully applied in recent years for detecting new and unseen computer viruses. The viruses were, however, detected in small virus loade...
Thomas Stibor
ICCV
2005
IEEE
14 years 11 months ago
Detection of Concentric Circles for Camera Calibration
The geometry of plane-based calibration methods is well understood, but some user interaction is often needed in practice for feature detection. This paper presents a fully automa...
Guang Jiang, Long Quan