Sciweavers

417 search results - page 20 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
ICDAR
2009
IEEE
14 years 2 months ago
Text-Tracking Wearable Camera System for the Blind
Disability of visual text reading has a huge impact on the quality of life for visually disabled people. One of the most anticipated devices is a wearable camera capable of findi...
Hideaki Goto, Makoto Tanaka
ICPR
2008
IEEE
14 years 2 months ago
Text-tracking wearable camera system for visually-impaired people
Disability of visual text reading has a huge impact on the quality of life for visually disabled people. One of the most anticipated devices is a wearable camera capable of findi...
Makoto Tanaka, Hideaki Goto
ACSAC
2004
IEEE
13 years 11 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
IPCCC
2007
IEEE
14 years 2 months ago
SpyCon: Emulating User Activities to Detect Evasive Spyware
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies employing signature and anomaly based systems have had rea...
Madhusudhanan Chandrasekaran, Vidyaraman Vidyarama...
ICMCS
2006
IEEE
120views Multimedia» more  ICMCS 2006»
14 years 1 months ago
SVM-Based Shot Boundary Detection with a Novel Feature
This paper describes our new algorithm for shot boundary detection and its evaluation. We adopt a 2-stage data fusion approach with SVM technique to decide whether a boundary exis...
Kazunori Matsumoto, Masaki Naito, Keiichiro Hoashi...