Sciweavers

29 search results - page 4 / 6
» Intention modelling: approximating computer user intentions ...
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
14 years 22 days ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CVPR
1999
IEEE
14 years 10 months ago
Vision-Based Speaker Detection Using Bayesian Networks
The development of user interfaces based on vision and speech requires the solution of a challenging statistical inference problem: The intentions and actions of multiple individu...
James M. Rehg, Kevin P. Murphy, Paul W. Fieguth
OTM
2005
Springer
14 years 2 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
RAID
2010
Springer
13 years 7 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
ICPR
2002
IEEE
14 years 9 months ago
Recognition of Gestures in the Context of Speech
The scope of this paper is the interpretation of a user's intention via a video camera and a speech recognizer. In comparison to previous work which only takes into account g...
Matthieu Bray, Hedvig Sidenbladh, Jan-Olof Eklundh