Sciweavers

592 search results - page 86 / 119
» Learning of personalized security settings
Sort
View
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
13 years 11 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
ICDE
2008
IEEE
146views Database» more  ICDE 2008»
14 years 9 months ago
Explaining and Reformulating Authority Flow Queries
Authority flow is an effective ranking mechanism for answering queries on a broad class of data. Systems have been developed to apply this principle on the Web (PageRank and topic ...
Ramakrishna Varadarajan, Vagelis Hristidis, Louiqa...
ICPR
2000
IEEE
14 years 8 months ago
Growing Gaussian Mixture Models for Pose Invariant Face Recognition
A major challenge for face recognition algorithms lies in the variance faces undergo while changing pose. This problem is typically addressed by building view dependent models bas...
Ralph Gross, Jie Yang, Alex Waibel
ADHOCNETS
2009
Springer
14 years 2 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
ICCV
2007
IEEE
14 years 2 months ago
Multilinear Projection for Appearance-Based Recognition in the Tensor Framework
Numerical multilinear (tensor) algebra is a principled mathematical approach to disentangling and explicitly and parsimoniously representing the essential factors or modes of imag...
M. Alex O. Vasilescu, Demetri Terzopoulos