Sciweavers

2236 search results - page 341 / 448
» Intrusion detection techniques and approaches
Sort
View
ICIP
2009
IEEE
14 years 10 months ago
Learning Contextual Rules For Priming Object Categories In Images
In this paper we introduce and exploit the concept of contextual rules in the field of object detection. These rules are defined as associations between different object likelihoo...
IPMI
1999
Springer
14 years 10 months ago
Statistical Shape Analysis Using Fixed Topology Skeletons: Corpus Callosum Study
The goal of this work is to develop an approach to shape representation and classification that will allow us to detect and quantify differences in shape of anatomical structures d...
Polina Golland, W. Eric L. Grimson, Ron Kikinis
ICML
2009
IEEE
14 years 10 months ago
Identifying suspicious URLs: an application of large-scale online learning
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...
ISBI
2008
IEEE
14 years 10 months ago
Mutual information-based feature selection enhances fMRI brain activity classification
In this paper, we adress the question of decoding cognitive information from functional Magnetic Resonance (MR) images using classification techniques. The main bottleneck for acc...
Bertrand Thirion, Cécilia Damon, Vincent Mi...
ATS
2009
IEEE
111views Hardware» more  ATS 2009»
14 years 4 months ago
Dynamic Compaction in SAT-Based ATPG
SAT-based automatic test pattern generation has several advantages compared to conventional structural procedures, yet often yields too large test sets. We present a dynamic compa...
Alejandro Czutro, Ilia Polian, Piet Engelke, Sudha...