Sciweavers

799 search results - page 107 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
JCIT
2010
156views more  JCIT 2010»
13 years 2 months ago
Intelligent Monitoring Approach for Pipeline Defect Detection from MFL Inspection
Artificial Neural Networks(ANNS) have top level of capability to progress the estimation of cracks in metal tubes. The aim of this paper is to propose an algorithm to identify mod...
Saeedreza Ehteram, Seyed Zeinolabedin Moussavi, Mo...
ECCV
2010
Springer
14 years 1 months ago
Detecting People Using Mutually Consistent Poselet Activations
Bourdev and Malik (ICCV 09) introduced a new notion of parts, poselets, constructed to be tightly clustered both in the configuration space of keypoints, as well as in the appeara...
CIKM
2005
Springer
14 years 1 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
CVPR
2005
IEEE
14 years 9 months ago
A Statistical Field Model for Pedestrian Detection
This paper presents a new statistical model for detecting and tracking deformable objects such as pedestrians, where large shape variations induced by local shape deformation can ...
Ying Wu, Ting Yu, Gang Hua
ATAL
2009
Springer
14 years 14 days ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...