Sciweavers

2236 search results - page 307 / 448
» Intrusion detection techniques and approaches
Sort
View
CJ
2010
150views more  CJ 2010»
13 years 7 months ago
Program Analysis Probably Counts
Abstract. Semantics-based program analysis uses an abstract semantics of programs/systems to statically determine run-time properties. Classic examples from compiler technology inc...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
CVPR
2001
IEEE
15 years 11 days ago
Tracking of Object with SVM Regression
This paper presents a novel feature-matching based approach for rigid object tracking. The proposed method models the tracking problem as discovering the affine transforms of obje...
Weiyu Zhu, Song Wang, Ruei-Sung Lin, Stephen E. Le...
ICPR
2006
IEEE
14 years 11 months ago
Forest Extension of Error Correcting Output Codes and Boosted Landmarks
In this paper, we introduce a robust novel approach for detecting objects category in cluttered scenes by generating boosted contextual descriptors of landmarks. In particular, ou...
Oriol Pujol, Petia Radeva, Sergio Escalera
AIRWEB
2009
Springer
14 years 5 months ago
Looking into the past to better classify web spam
Web spamming techniques aim to achieve undeserved rankings in search results. Research has been widely conducted on identifying such spam and neutralizing its influence. However,...
Na Dai, Brian D. Davison, Xiaoguang Qi
ICDAR
2005
IEEE
14 years 4 months ago
An Old Greek Handwritten OCR System
Recognition of handwritten manuscripts is essential for efficient content exploitation of the valuable Old Greek historical collections. In this paper, we focus on the problem of ...
Kostas Ntzios, Basilios Gatos, Ioannis Pratikakis,...