Sciweavers

888 search results - page 67 / 178
» Digital detective - Bluetooth
Sort
View
KDD
2009
ACM
193views Data Mining» more  KDD 2009»
14 years 5 months ago
Category detection using hierarchical mean shift
Many applications in surveillance, monitoring, scientific discovery, and data cleaning require the identification of anomalies. Although many methods have been developed to iden...
Pavan Vatturi, Weng-Keen Wong
SIGCOMM
2009
ACM
14 years 4 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
MM
2006
ACM
155views Multimedia» more  MM 2006»
14 years 4 months ago
Robust voting algorithm based on labels of behavior for video copy detection
This paper presents an efficient approach for copies detection in a large videos archive consisting of several hundred of hours. The video content indexing method consists of ext...
Julien Law-To, Olivier Buisson, Valérie Gou...
EC
2008
174views ECommerce» more  EC 2008»
13 years 9 months ago
Automated Design of Image Operators that Detect Interest Points
This work describes how evolutionary computation can be used to synthesize lowlevel image operators that detect interesting points on digital images. Interest point detection is a...
Leonardo Trujillo, Gustavo Olague
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 10 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...