Sciweavers

2236 search results - page 287 / 448
» Intrusion detection techniques and approaches
Sort
View
ECIR
2008
Springer
14 years 2 days ago
Towards an Automatically Generated Music Information System Via Web Content Mining
Abstract. This paper presents first steps towards building a music information system like last.fm, but with the major difference that the data is automatically retrieved from the ...
Markus Schedl, Peter Knees, Tim Pohle, Gerhard Wid...
CLA
2006
14 years 1 days ago
Using FCA to Suggest Refactorings to Correct Design Defects
Abstract. Design defects are poor design choices resulting in a hard-tomaintain software, hence their detection and correction are key steps of a disciplined software process aimed...
Naouel Moha, Jihene Rezgui, Yann-Gaël Gu&eacu...
BMVC
2000
14 years 3 hour ago
Recognising the Dynamics of Faces across Multiple Views
We present an integrated framework for dynamic face detection and recognition, where head pose is estimated using Support Vector Regression, face detection is performed by Support...
Yongmin Li, Shaogang Gong, Heather M. Liddell
IDEAL
2010
Springer
13 years 9 months ago
Analysing Satellite Image Time Series by Means of Pattern Mining
Abstract. Change detection in satellite image time series is an important domain with various applications in land study. Most previous works proposed to perform this detection by ...
François Petitjean, Pierre Gançarski...
ICASSP
2009
IEEE
14 years 5 months ago
A study of pronunciation verification in a speech therapy application
Techniques are presented for detecting phoneme level mispronunciations in utterances obtained from a population of impaired children speakers. The intended application of these ap...
Shou-Chun Yin, Richard Rose, Oscar Saz, Eduardo Ll...