Sciweavers

686 search results - page 53 / 138
» On the General Applicability of Instruction-Set Randomizatio...
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 8 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
130
Voted
PAMI
2000
142views more  PAMI 2000»
15 years 3 months ago
Evolutionary Pursuit and Its Application to Face Recognition
Abstract-- This paper introduces Evolutionary Pursuit (EP) as a novel and adaptive representation method for image encoding and classification. In analogy to projection pursuit met...
Chengjun Liu, Harry Wechsler
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
16 years 3 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
151
Voted
EDBT
2009
ACM
173views Database» more  EDBT 2009»
15 years 8 months ago
PROUD: a probabilistic approach to processing similarity queries over uncertain data streams
We present PROUD - A PRObabilistic approach to processing similarity queries over Uncertain Data streams, where the data streams here are mainly time series streams. In contrast t...
Mi-Yen Yeh, Kun-Lung Wu, Philip S. Yu, Ming-Syan C...
AAAI
1997
15 years 4 months ago
Effective Bayesian Inference for Stochastic Programs
In this paper, we propose a stochastic version of a general purpose functional programming language as a method of modeling stochastic processes. The language contains random choi...
Daphne Koller, David A. McAllester, Avi Pfeffer