Sciweavers

405 search results - page 24 / 81
» Evaluation of Anomaly Detection Method Based on Pattern Reco...
Sort
View
CP
2000
Springer
14 years 29 days ago
A Language for Audiovisual Template Specification and Recognition
We address the issue of detecting automatically occurrences of high level patterns in audiovisual documents. These patterns correspond to recurring sequences of shots, which are co...
Jean Carrive, Pierre Roy, François Pachet, ...
GECCO
2008
Springer
162views Optimization» more  GECCO 2008»
13 years 9 months ago
Robust method of detecting moving objects in videos evolved by genetic programming
In this paper we investigated the use of Genetic Programming (GP) to evolve programs which could detect moving objects in videos. Two main approaches under the paradigm were propo...
Andy Song, Danny Fang
ICAI
2008
13 years 10 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
IBPRIA
2007
Springer
14 years 2 months ago
Breast Skin-Line Segmentation Using Contour Growing
This paper presents a novel methodology to obtain the breast skin line in mammographic images. The breast edge provides important information of the breast shape and deformation wh...
Robert Marti, Arnau Oliver, David Raba, Jordi Frei...
ACSAC
2008
IEEE
14 years 3 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...