Sciweavers

1191 search results - page 35 / 239
» Distributed Detection of Information Flows
Sort
View
ISSADS
2005
Springer
14 years 2 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
FGR
1998
IEEE
203views Biometrics» more  FGR 1998»
14 years 1 months ago
Automated Facial Expression Recognition Based on FACS Action Units
Automated recognition of facial expression is an important addition to computer vision research because of its relevance to the study of psychological phenomena and the developmen...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
SIGIR
2005
ACM
14 years 2 months ago
Using term informativeness for named entity detection
Informal communication (e-mail, bulletin boards) poses a difficult learning environment because traditional grammatical and lexical information are noisy. Other information is nec...
Jason D. M. Rennie, Tommi Jaakkola
INFOCOM
2007
IEEE
14 years 3 months ago
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...
Ritesh Maheshwari, Jie Gao, Samir R. Das
SPIESR
2001
133views Database» more  SPIESR 2001»
13 years 10 months ago
Shot detection combining Bayesian and structural information
There are a number of shots in a video, each of which has boundary types, such as cut, fade, dissolve and wipe. Many previous approaches can find the cut boundary without difficul...
Seung-Hoon Han, In-So Kweon