Sciweavers

179 search results - page 24 / 36
» Learning at Low False Positive Rates
Sort
View
CCS
2007
ACM
13 years 11 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 7 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
ASPLOS
2004
ACM
14 years 27 days ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
BMCBI
2008
141views more  BMCBI 2008»
13 years 7 months ago
MiRTif: a support vector machine-based microRNA target interaction filter
Background: MicroRNAs (miRNAs) are a set of small non-coding RNAs serving as important negative gene regulators. In animals, miRNAs turn down protein translation by binding to the...
Yuchen Yang, Yu-Ping Wang, Kuo-Bin Li
CVPR
2009
IEEE
2216views Computer Vision» more  CVPR 2009»
15 years 2 months ago
Object Detection using a Max-Margin Hough Transform
We present a discriminative Hough transform based ob- ject detector where each local part casts a weighted vote for the possible locations of the object center. We show that the ...
Subhransu Maji (University of California, Berkeley...