• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,556
Next 10 →

A survey of outlier detection methodologies

by Victoria J. Hodge, Jim Austin - Artificial Intelligence Review , 2004
"... Abstract. Outlier detection has been used for centuries to detect and, where appropriate, remove anomalous observations from data. Outliers arise due to mechanical faults, changes in system behaviour, fraudulent behaviour, human error, instrument error or simply through natural deviations in populat ..."
Abstract - Cited by 312 (3 self) - Add to MetaCart
Abstract. Outlier detection has been used for centuries to detect and, where appropriate, remove anomalous observations from data. Outliers arise due to mechanical faults, changes in system behaviour, fraudulent behaviour, human error, instrument error or simply through natural deviations

Feature detection with automatic scale selection

by Tony Lindeberg - International Journal of Computer Vision , 1998
"... The fact that objects in the world appear in different ways depending on the scale of observation has important implications if one aims at describing them. It shows that the notion of scale is of utmost importance when processing unknown measurement data by automatic methods. In their seminal works ..."
Abstract - Cited by 723 (34 self) - Add to MetaCart
scales for further analysis. This article proposes a systematic methodology for dealing with this problem. A framework is proposed for generating hypotheses about interesting scale levels in image data, based on a general principle stating that local extrema over scales of different combinations of γ

Model-Based Clustering, Discriminant Analysis, and Density Estimation

by Chris Fraley, Adrian E. Raftery - JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION , 2000
"... Cluster analysis is the automated search for groups of related observations in a data set. Most clustering done in practice is based largely on heuristic but intuitively reasonable procedures and most clustering methods available in commercial software are also of this type. However, there is little ..."
Abstract - Cited by 573 (29 self) - Add to MetaCart
, there is little systematic guidance associated with these methods for solving important practical questions that arise in cluster analysis, such as \How many clusters are there?", "Which clustering method should be used?" and \How should outliers be handled?". We outline a general methodology

Robust principal component analysis?

by Emmanuel J Candès , Xiaodong Li , Yi Ma , John Wright - Journal of the ACM, , 2011
"... Abstract This paper is about a curious phenomenon. Suppose we have a data matrix, which is the superposition of a low-rank component and a sparse component. Can we recover each component individually? We prove that under some suitable assumptions, it is possible to recover both the low-rank and the ..."
Abstract - Cited by 569 (26 self) - Add to MetaCart
this optimization problem, and present applications in the area of video surveillance, where our methodology allows for the detection of objects in a cluttered background, and in the area of face recognition, where it offers a principled way of removing shadows and specularities in images of faces.

Anomaly Detection Methodologies

by Julie Huff
"... 2.Neural network 3.Machine learning 2. Intrusion detection 1.Categories 2.Algorithmic techniques 3. Anomaly detection techniques in IDS 1.A novel anomaly detection technique using Kohonen network 2.Conclusions from the tests conducted on multi-level K-map ..."
Abstract - Add to MetaCart
2.Neural network 3.Machine learning 2. Intrusion detection 1.Categories 2.Algorithmic techniques 3. Anomaly detection techniques in IDS 1.A novel anomaly detection technique using Kohonen network 2.Conclusions from the tests conducted on multi-level K-map

A Dynamic Intrusion-Detection Methodology

by John C. Munson, Sebastian G. Elbaum
"... The present invention is a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. This detection methodology is novel in that it is based on behavioral information obtained from a suitably instrumented computer program as it is exec ..."
Abstract - Add to MetaCart
The present invention is a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. This detection methodology is novel in that it is based on behavioral information obtained from a suitably instrumented computer program

Surveying port scans and their detection methodologies

by Monowar H Bhuyan , D K Bhattacharyya , J K Kalita - Comput. J , 2011
"... Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of IP addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious ..."
Abstract - Cited by 10 (4 self) - Add to MetaCart
Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of IP addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious

A Software Defect Detection Methodology

by Ronald Kirk Kandt
"... Abstract. This paper identifies baseline procedures for verifying software for individual, small team, and large team development efforts for mission-critical and non-mission-critical software. It is based on defect-based inspections and basis path testing. Basis path testing provides a unified appr ..."
Abstract - Add to MetaCart
Abstract. This paper identifies baseline procedures for verifying software for individual, small team, and large team development efforts for mission-critical and non-mission-critical software. It is based on defect-based inspections and basis path testing. Basis path testing provides a unified approach for performing unit, integration, and functional tests, whereas defect-based inspections are primarily used for verifying requirement and design documents. However, in situations where practitioners cannot afford to be as thorough as basis path testing permits, several heuristics are defined for prioritizing the remaining verification efforts and deciding which technique to apply. In addition, several studies are discussed that identify the relative merit of various verification tech-niques.

Learning to detect objects in images via a sparse, part-based representation

by Shivani Agarwal, Aatif Awan, Dan Roth - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2004
"... We study the problem of detecting objects in still, grayscale images. Our primary focus is development of a learning-based approach to the problem, that makes use of a sparse, part-based representation. A vocabulary of distinctive object parts is automatically constructed from a set of sample image ..."
Abstract - Cited by 378 (1 self) - Add to MetaCart
occlusion. In evaluating object detection approaches, several important methodological issues arise that have not been satisfactorily addressed in previous work. A secondary focus of this paper is to highlight these issues and to develop rigorous evaluation standards for the object detection problem. A

Edge Detection and Ridge Detection with Automatic Scale Selection

by Tony Lindeberg - CVPR'96 , 1996
"... When extracting features from image data, the type of information that can be extracted may be strongly dependent on the scales at which the feature detectors are applied. This article presents a systematic methodology for addressing this problem. A mechanism is presented for automatic selection of ..."
Abstract - Cited by 347 (24 self) - Add to MetaCart
When extracting features from image data, the type of information that can be extracted may be strongly dependent on the scales at which the feature detectors are applied. This article presents a systematic methodology for addressing this problem. A mechanism is presented for automatic selection
Next 10 →
Results 1 - 10 of 11,556
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University