Sciweavers

220 search results - page 23 / 44
» Intrinsic Plagiarism Detection
Sort
View

Publication
815views
13 years 3 months ago
Activity Understanding and Unusual Event Detection in Surveillance Videos
Computer scientists have made ceaseless efforts to replicate cognitive video understanding abilities of human brains onto autonomous vision systems. As video surveillance cameras ...
Chen Change Loy
ISBI
2006
IEEE
14 years 8 months ago
Nonlinear classification of EEG data for seizure detection
We address the problem of classification of EEG recordings for the detection of epileptic seizures. We assume that the EEG measurements can be described by a low dimensional manif...
Mabel Ramírez-Vélez, Richard Staba, ...
VIIP
2001
13 years 9 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
GECCO
2007
Springer
206views Optimization» more  GECCO 2007»
13 years 11 months ago
Using code metric histograms and genetic algorithms to perform author identification for software forensics
We have developed a technique to characterize software developers' styles using a set of source code metrics. This style fingerprint can be used to identify the likely author...
Robert Charles Lange, Spiros Mancoridis
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
13 years 9 months ago
Meta Analysis within Authorship Verification
In an authorship verification problem one is given writing examples from an author A, and one is asked to determine whether or not each text in fact was written by A. In a more ge...
Benno Stein, Nedim Lipka, Sven Meyer zu Eissen