Sciweavers

2100 search results - page 299 / 420
» Fundamentals of the problem
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
14 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
SIGGRAPH
2010
ACM
14 years 1 months ago
Motion-based video retargeting with optimized crop-and-warp
We introduce a video retargeting method that achieves high-quality resizing to arbitrary aspect ratios for complex videos containing diverse camera and dynamic motions. Previous c...
Yu-Shuen Wang, Hui-Chih Lin, Olga Sorkine, Tong-Ye...
ER
2006
Springer
137views Database» more  ER 2006»
14 years 28 days ago
Preference Functional Dependencies for Managing Choices
Abstract. The notion of user preference in database modeling has recently received much attention in advanced applications, such as personalization of e-services, since it captures...
Wilfred Ng
EWCBR
2006
Springer
14 years 27 days ago
Case-Base Maintenance for CCBR-Based Process Evolution
The success of a company more and more depends on its ability to flexibly and quickly react to changes. Combining process management techniques and conversational case-based reason...
Barbara Weber, Manfred Reichert, Werner Wild
GECCO
2006
Springer
159views Optimization» more  GECCO 2006»
14 years 27 days ago
Genetic algorithms for positioning and utilizing sensors in synthetically generated landscapes
Positioning multiple sensors for acquisition of a a given environment is one of the fundamental research areas in various fields, such as military scouting, computer vision and ro...
Haluk Topcuoglu, Murat Ermis