Sciweavers

1777 search results - page 302 / 356
» Surveillance Event Detection
Sort
View
ICASSP
2010
IEEE
13 years 10 months ago
Discriminative template extraction for direct modeling
This paper addresses the problem of developing appropriate features for use in direct modeling approaches to speech recognition, such as those based on Maximum Entropy models or S...
Shankar Shivappa, Patrick Nguyen, Geoffrey Zweig
CCR
2008
86views more  CCR 2008»
13 years 10 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 10 months ago
Locating phase transitions in computationally hard problems
We discuss how phase-transitions may be detected in computationally hard problems in the context of anytime algorithms. Treating the computational time, value and utility functions...
B. Ashok, T. K. Patra
IJISEC
2006
106views more  IJISEC 2006»
13 years 10 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
CORR
2007
Springer
124views Education» more  CORR 2007»
13 years 10 months ago
Graph-Based Decoding in the Presence of ISI
We propose a new graph representation for ISI channels that can be used for combined equalization and decoding by linear programming (LP) or iterative message-passing (IMP) decodi...
Mohammad H. Taghavi, Paul H. Siegel