Sciweavers

12 search results - page 2 / 3
» Posterior-based confidence measures for spoken term detectio...
Sort
View
ACMSE
2005
ACM
14 years 27 days ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ACL
2008
13 years 8 months ago
A Critical Reassessment of Evaluation Baselines for Speech Summarization
We assess the current state of the art in speech summarization, by comparing a typical summarizer on two different domains: lecture data and the SWITCHBOARD corpus. Our results ca...
Gerald Penn, Xiaodan Zhu
CLEF
2009
Springer
13 years 5 months ago
Exploiting Speech Recognition Transcripts for Narrative Peak Detection in Short-Form Documentaries
Narrative peaks are points at which the viewer perceives a spike in the level of dramatic tension within the narrative flow of a video. This paper reports on four approaches to na...
Martha Larson, Bart Jochems, Ewine Smits, Roeland ...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
14 years 7 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev