Sciweavers

310 search results - page 8 / 62
» MuFeSaC: Learning When to Use Which Feature Detector
Sort
View
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
CIKM
2010
Springer
13 years 6 months ago
Novel local features with hybrid sampling technique for image retrieval
In image retrieval, most existing approaches that incorporate local features produce high dimensional vectors, which lead to a high computational and data storage cost. Moreover, ...
Leszek Kaliciak, Dawei Song, Nirmalie Wiratunga, J...
IEEEARES
2010
IEEE
14 years 1 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
ICCV
2005
IEEE
14 years 1 months ago
Contour-Based Learning for Object Detection
We present a novel categorical object detection scheme that uses only local contour-based features. A two-stage, partially supervised learning architecture is proposed: a rudiment...
Jamie Shotton, Andrew Blake, Roberto Cipolla
ECCV
2010
Springer
13 years 8 months ago
Loosely Distinctive Features for Robust Surface Alignment
Many successful feature detectors and descriptors exist for 2D intensity images. However, obtaining the same effectiveness in the domain of 3D objects has proven to be a more elusi...
Andrea Albarelli, Emanuele Rodolà, Andrea T...