Sciweavers

872 search results - page 29 / 175
» Sketch-based change detection: methods, evaluation, and appl...
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
HUC
2011
Springer
12 years 8 months ago
iBAT: detecting anomalous taxi trajectories from GPS traces
GPS-equipped taxis can be viewed as pervasive sensors and the large-scale digital traces produced allow us to reveal many hidden “facts” about the city dynamics and human beha...
Daqing Zhang, Nan Li, Zhi-Hua Zhou, Chao Chen, Lin...
BMCBI
2010
93views more  BMCBI 2010»
13 years 8 months ago
HAT: Hypergeometric Analysis of Tiling-arrays with application to promoter-GeneChip data
Background: Tiling-arrays are applicable to multiple types of biological research questions. Due to its advantages (high sensitivity, resolution, unbiased), the technology is ofte...
Erdogan Taskesen, Renee Beekman, Jeroen de Ridder,...
ICPR
2008
IEEE
14 years 9 months ago
Review and evaluation of commonly-implemented background subtraction algorithms
Locating moving objects in a video sequence is the first step of many computer vision applications. Among the various motion-detection techniques, background subtraction methods a...
Bruno Emile, Christophe Rosenberger, Hél&eg...
ISM
2005
IEEE
132views Multimedia» more  ISM 2005»
14 years 2 months ago
A Pitch-Based Rapid Speech Segmentation for Speaker Indexing
Segmentation of continuous audio is important for speaker indexing. The reliability of models in speaker indexing depends much on segmentation. Commonly used method is based on th...
Min Yang, Yingchun Yang, Zhaohui Wu