Sciweavers

703 search results - page 84 / 141
» Graph-based anomaly detection
Sort
View
SCIA
2007
Springer
118views Image Analysis» more  SCIA 2007»
14 years 2 months ago
Reconstruction of 3D Curves for Quality Control
In the area of quality control by vision, the reconstruction of 3D curves is a convenient tool to detect and quantify possible anomalies. Whereas other methods exist that allow us ...
Hanna Martinsson, François Gaspard, Adrien ...
FLAIRS
2004
13 years 10 months ago
Interactive Refinement of a Knowledge Base
This paper presents a new method of interactive refinement of a knowledge base. The first step of our method is a validation stage which checks the consistency and the completenes...
R. Djelouah, Béatrice Duval, Stéphan...
ICDCS
2006
IEEE
14 years 2 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 2 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
CAISE
2006
Springer
14 years 13 days ago
Detecting Changes in Ontologies via DAG Comparison
Abstract. Ontologies are shared conceptualizations of a certain domain. As such domains may change, also changes in the ontologies have to be considered, as otherwise there is no w...
Johann Eder, Karl Wiggisser