Sciweavers

352 search results - page 40 / 71
» Right Association Revisited
Sort
View
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 11 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
SSPR
1998
Springer
13 years 11 months ago
Object Recognition from Large Structural Libraries
This paper presents a probabilistic similarity measure for object recognition from large libraries of line-patterns. We commence from a structural pattern representation which use...
Benoit Huet, Edwin R. Hancock
IWPC
1997
IEEE
13 years 11 months ago
Identifying objects in legacy systems
Many organisations are migrating towards object-oriented technology. However, owing to the business value of legacy software, new object-oriented development has to be weighed aga...
Aniello Cimitile, Andrea De Lucia, Giuseppe A. Di ...
GLOBECOM
2009
IEEE
13 years 11 months ago
Restarting Particle Filters: An Approach to Improve the Performance of Dynamic Indoor Localization
Particle filters have been found to be effective in tracking mobile targets in indoor environments. One frequently encountered problem in these settings occurs when the target'...
Begumhan Turgut, Richard P. Martin
NIPS
2007
13 years 9 months ago
EEG-Based Brain-Computer Interaction: Improved Accuracy by Automatic Single-Trial Error Detection
Brain-computer interfaces (BCIs), as any other interaction modality based on physiological signals and body channels (e.g., muscular activity, speech and gestures), are prone to e...
Pierre W. Ferrez, José del R. Millán