Sciweavers

271 search results - page 9 / 55
» Multi-target Detection by Multi-sensor Systems: A Comparison...
Sort
View
ISW
2004
Springer
14 years 3 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier
FGR
2000
IEEE
167views Biometrics» more  FGR 2000»
14 years 1 months ago
Comparison of Confidence Measures for Face Recognition
This paper compares different confidence measures for the results of statistical face recognition systems. The main applications of a confidence measure are rejection of unknown p...
Stefan Eickeler, Mirco Jabs, Gerhard Rigoll
ICIP
1999
IEEE
14 years 11 months ago
Roc Curves for Performance Evaluation of Video Sequences Processing Systems for Surveillance Applications
Performances evaluation of image processing intermediate results in video based surveillance systems is extremely important due to the variety of approaches to this task. In this ...
Franco Oberti, Andrea Teschioni, Carlo S. Regazzon...
ACSAC
2004
IEEE
14 years 1 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
ICASSP
2008
IEEE
14 years 4 months ago
Confidence estimation, OOV detection and language ID using phone-to-word transduction and phone-level alignments
Automatic Speech Recognition (ASR) systems continue to make errors during search when handling various phenomena including noise, pronunciation variation, and out of vocabulary (O...
Christopher M. White, Geoffrey Zweig, Lukas Burget...