Sciweavers

541 search results - page 99 / 109
» Query Strategies for Priced Information
Sort
View
CCS
2009
ACM
14 years 2 months ago
Active learning for network intrusion detection
Anomaly detection for network intrusion detection is usually considered an unsupervised task. Prominent techniques, such as one-class support vector machines, learn a hypersphere ...
Nico Görnitz, Marius Kloft, Konrad Rieck, Ulf...
PKDD
2009
Springer
174views Data Mining» more  PKDD 2009»
14 years 2 months ago
Active and Semi-supervised Data Domain Description
Data domain description techniques aim at deriving concise descriptions of objects belonging to a category of interest. For instance, the support vector domain description (SVDD) l...
Nico Görnitz, Marius Kloft, Ulf Brefeld
ICDCSW
2007
IEEE
14 years 1 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...
MIR
2006
ACM
150views Multimedia» more  MIR 2006»
14 years 1 months ago
Exploring temporal consistency for video analysis and retrieval
Temporal consistency is ubiquitous in video data, where temporally adjacent video shots usually share similar visual and semantic content. This paper presents a thorough study of ...
Jun Yang 0003, Alexander G. Hauptmann
CLEF
2005
Springer
14 years 1 months ago
CUHK at ImageCLEF 2005: Cross-Language and Cross-Media Image Retrieval
In this paper, we describe our studies of cross-language and cross-media image retrieval at the ImageCLEF 2005. This is the first participation of our CUHK (The Chinese University...
Steven C. H. Hoi, Jianke Zhu, Michael R. Lyu