Sciweavers

462 search results - page 67 / 93
» Information visualization for an intrusion detection system
Sort
View
KDD
2004
ACM
210views Data Mining» more  KDD 2004»
14 years 8 months ago
Visually mining and monitoring massive time series
Moments before the launch of every space vehicle, engineering discipline specialists must make a critical go/no-go decision. The cost of a false positive, allowing a launch in spi...
Jessica Lin, Eamonn J. Keogh, Stefano Lonardi, Jef...
ISWC
2003
IEEE
14 years 25 days ago
Shoes as a Platform for Vision
We explore the use of a shoe-mounted camera as a sensory system for wearable computing. We demonstrate tools useful for gait analysis, obstacle detection, and context recognition....
Paul M. Fitzpatrick, Charles C. Kemp
CVPR
2003
IEEE
14 years 9 months ago
Computing Layered Surface Representations: An Algorithm for Detecting and Separating Transparent Overlays
The biological visual system possesses the ability to compute layered surface representations, in which one surface is represented as being viewed through another. This ability is...
Manish Singh, Xiaolei Huang
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
IJCV
2008
223views more  IJCV 2008»
13 years 7 months ago
Robust Object Detection with Interleaved Categorization and Segmentation
This paper presents a novel method for detecting and localizing objects of a visual category in cluttered real-world scenes. Our approach considers object categorization and figure...
Bastian Leibe, Ales Leonardis, Bernt Schiele