Sciweavers

307 search results - page 49 / 62
» Host Based Intrusion Detection using Machine Learning
Sort
View
RAID
1999
Springer
13 years 11 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
ICMI
2009
Springer
198views Biometrics» more  ICMI 2009»
14 years 2 months ago
Detecting, tracking and interacting with people in a public space
We have built a system that engages naive users in an audiovisual interaction with a computer in an unconstrained public space. We combine audio source localization techniques wit...
Sunsern Cheamanunkul, Evan Ettinger, Matt Jacobsen...
EUROSSC
2008
Springer
13 years 9 months ago
Gaussian Process Person Identifier Based on Simple Floor Sensors
Abstract. This paper describes methods and sensor technology used to identify persons from their walking characteristics. We use an array of simple binary switch floor sensors to d...
Jaakko Suutala, Kaori Fujinami, Juha Röning
IJAIT
2006
121views more  IJAIT 2006»
13 years 7 months ago
An Efficient Feature Selection Algorithm for Computer-aided Polyp Detection
We present an efficient feature selection algorithm for computer aided detection (CAD) computed tomographic (CT) colonography. The algorithm 1) determines an appropriate piecewise...
Jiang Li, Jianhua Yao, Ronald M. Summers, Nicholas...
SIGDIAL
2010
13 years 5 months ago
Towards an Empirically Motivated Typology of Follow-Up Questions: The Role of Dialogue Context
A central problem in Interactive Question Answering (IQA) is how to answer Follow-Up Questions (FU Qs), possibly by taking advantage of information from the dialogue context. We a...
Manuel Kirschner, Raffaella Bernardi