Sciweavers

1804 search results - page 300 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
ECCV
2002
Springer
14 years 10 months ago
Fusion of Multiple Tracking Algorithms for Robust People Tracking
This paper shows how the output of a number of detection and tracking algorithms can be fused to achieve robust tracking of people in an indoor environment. The new tracking system...
Nils T. Siebel, Stephen J. Maybank
ACL
2003
13 years 10 months ago
A Syllable Based Word Recognition Model for Korean Noun Extraction
Noun extraction is very important for many NLP applications such as information retrieval, automatic text classification, and information extraction. Most of the previous Korean ...
Do-Gil Lee, Hae-Chang Rim, Heui-Seok Lim
CSL
2007
Springer
14 years 3 months ago
Incorporating Tables into Proofs
We consider the problem of automating and checking the use of previously proved lemmas in the proof of some main theorem. In particular, we call the collection of such previously p...
Dale Miller, Vivek Nigam
IPPS
2008
IEEE
14 years 3 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
ANSS
2000
IEEE
14 years 1 months ago
Modeling and Analysis of Software Aging and Rejuvenation
Software systems are known to suffer from outages due to transient errors. Recently, the phenomenon of “software aging”, one in which the state of the software system degrades...
Kishor S. Trivedi, Kalyanaraman Vaidyanathan, Kate...