Sciweavers

405 search results - page 26 / 81
» Evaluation of Anomaly Detection Method Based on Pattern Reco...
Sort
View
IBPRIA
2005
Springer
14 years 2 months ago
An Approach to Vision-Based Person Detection in Robotic Applications
We present an approach to vision-based person detection in robotic applications that integrates top down template matching with bottom up classifiers. We detect components of the ...
Carlos D. Castillo, Carolina Chang
ICASSP
2008
IEEE
14 years 3 months ago
Effective error prediction using decision tree for ASR grammar network in call system
CALL (Computer Assisted Language Learning) systems using ASR (Automatic Speech Recognition) for second language learning have received increasing interest recently. However, it st...
Hongcui Wang, Tatsuya Kawahara
IBPRIA
2005
Springer
14 years 2 months ago
An Algorithm for the Detection of Multiple Concentric Circles
This paper presents a method for the detection of multiple concentric circles which is based on the Hough Transform (HT). In order to reduce time and memory space the concentric ci...
Margarida Silveira
CIARP
2003
Springer
14 years 1 months ago
Automatic Dark Fibres Detection in Wool Tops
Is proposed a method for the automatic detection of dark fibres in wool tops based on image processing. A software which implements this method was developed, composed by five mo...
J. Bazerque, J. Ciambelli, S. Lafon, S. Randall
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 9 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan