Sciweavers

770 search results - page 76 / 154
» Subsequence similarity language models
Sort
View
146
Voted
WISTP
2010
Springer
15 years 10 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
136
Voted
MM
2006
ACM
162views Multimedia» more  MM 2006»
15 years 9 months ago
An innovative three-dimensional user interface for exploring music collections enriched
We present a novel, innovative user interface to music repositories. Given an arbitrary collection of digital music files, our system creates a virtual landscape which allows the...
Peter Knees, Markus Schedl, Tim Pohle, Gerhard Wid...
123
Voted
SAINT
2003
IEEE
15 years 9 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
134
Voted
ECHT
1992
15 years 7 months ago
Two Years before the Mist: Experiences with Aquanet
Aquanet is a collaborative hypertext tool that combines elements of frame-based knowledge representation and graphical presentation. In this paper, we examine the first major appl...
Catherine C. Marshall, Russell A. Rogers
148
Voted
SCA
2007
15 years 6 months ago
Arbitrary cutting of deformable tetrahedralized objects
We propose a flexible geometric algorithm for placing arbitrary cracks and incisions on tetrahedralized deformable objects. Although techniques based on remeshing can also accomm...
Eftychios Sifakis, Kevin G. Der, Ronald Fedkiw