Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
We demonstrate the use of context features, namely, names of places, and unlabelled data for the detection of personal name language of origin. While some early work used either r...
Vladimir Pervouchine, Min Zhang, Ming Liu, Haizhou...
Modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction, while human experts hold the advantage of possessing hig...
We propose a low cost method for the correction of the output of OCR engines through the use of human labor. The method employs an error estimator neural network that learns to as...
—Falls are dangerous for the aged population as they can adversely affect health. Therefore, many fall detection systems have been developed. However, prevalent methods only use ...
Qiang Li, John A. Stankovic, Mark A. Hanson, Adam ...