Sciweavers

2990 search results - page 155 / 598
» Thresholding for Change Detection
Sort
View
TELSYS
2010
132views more  TELSYS 2010»
13 years 4 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
DICTA
2003
13 years 11 months ago
Background Modeling and Subtraction Using a Local-linear-dependence-based Cauchy Statistical Model
:Many motion object detection algorithms rely on the process of background subtraction, an important technique which is used for detecting changes from a model of the background ...
Ying Ming, Jingjue Jiang, Jun Ming
KBSE
2007
IEEE
14 years 4 months ago
Automated detection of api refactorings in libraries
Software developers often do not build software from scratch but reuse software libraries. In theory, the APIs of a library should be stable, but in practice they do change and th...
Kunal Taneja, Danny Dig, Tao Xie
CBMS
2006
IEEE
14 years 4 months ago
Using the Morphology of the Photoplethysmogram Envelope to Automatically Detect Hypovolemia
There currently is no clinically accepted noninvasive technique for detecting moderate blood loss. Clinicians instead normally rely on lagging indicators such as blood pressure an...
Stephen Paul Linder, Suzanne Wendelken
ICUMT
2009
13 years 7 months ago
Cooperative robust sequential detection algorithms for Spectrum Sensing in Cognitive Radio
Abstract-- We consider the problem of Spectrum Sensing in Cognitive Radio Networks. In our previous work we have developed DualCUSUM, a distributed algorithm for change detection a...
ArunKumar Jayaprakasam, Vinod Sharma