摘要:
Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer. The score indicates a likelihood of a security violation. The score is validated and the scoring model is automatically updated responsive to results of the validating. The network activity is reported as suspicious in response to the score being within a threshold of a security violation value.
摘要:
Performing adaptive cyber-security analytics including a computer implemented method that includes receiving a report on a network activity. A score responsive to the network activity and to a scoring model is computed at a computer. The score indicates a likelihood of a security violation. The score is validated and the scoring model is automatically updated responsive to results of the validating. The network activity is reported as suspicious in response to the score being within a threshold of a security violation value.
摘要:
A method of filtering video packets for video stream monitoring is provided. A video packet of a video stream is received. One or more features are extracted from a specified frame of the video packet via one or more histograms and frequency domain coefficients of the specified frame. One or more concept detectors are implemented on the one or more features creating one or more confidence values. The confidence values are transmitted to a display module for filtering of video packets.
摘要:
Systems and methods for adaptive signal sampling and sample quantization for resource-constrained stream processing. Exemplary embodiments include a signal sampling and signal quantization method for a data stream from a ECG sensor into a pervasive device, the method including adaptively sampling the data stream, compressing data samples from the data stream, reducing the number of samples via quantization, defining a utility function for signal reconstruction, and formulating optimization on the reconstructed signal that is jointly sampled and quantized.
摘要:
A computer-implemented method for configuring a classifier structure includes receiving a classifier structure for identifying a feature of input data, adding a plurality of operating points to a parent binary classifier of the classifier structure, and setting the operating points to minimize a total cost based on resources available to the classifier structure. Each operating point controls how data is classified by the parent binary classifier for distribution to the child binary classifiers.
摘要:
A technique for identifying a defect in an object produced by a controllable process is disclosed. A first type of data generated as a result of production of the object by the controllable process is obtained. A second type of data generated as a result of production of the object by the controllable process is obtained. The first type of data and the second type of data are jointly analyzed. A defect is identified in the object based on the joint analysis of the first type of data and the second type of data.
摘要:
A technique for analyzing two or more data streams respectively generated from two or more components of a controllable process includes the following steps. In a first step, a statistical analysis is performed on each of the two or more data streams to generate first analysis results in the form of respective statistical results for the two or more data streams. In a second step, at least a portion of the statistical results from at least one of the two or more data streams is combined with at least a portion of the statistical results from at least another one of the two or more data streams to yield second analysis results. The controllable process is adjustable based on at least one of the first analysis results and the second analysis results.
摘要:
A technique for identifying a defect in an object produced by a controllable process. A first type of data generated as a result of production of the object by the controllable process is obtained. A second type of data generated as a result of production of the object by the controllable process is obtained. The first type of data and the second type of data are jointly analyzed. A defect is identified in the object based on the joint analysis of the first type of data and the second type of data. By way of example, the controllable process comprises a semiconductor manufacturing process such as a silicon wafer manufacturing process and the object produced by the semiconductor manufacturing process comprises a processed wafer. The first type of data comprises tool trace data and the second type of data comprises wafer image data. The tool trace data is generated by a photolithographic tool.
摘要:
A computer-implemented method for configuring a classifier structure includes receiving a classifier structure for identifying a feature of input data, adding a plurality of operating points to a parent binary classifier of the classifier structure, and setting the operating points to minimize a total cost based on resources available to the classifier structure. Each operating point controls how data is classified by the parent binary classifier for distribution to the child binary classifiers.
摘要:
An apparatus, a method and a system to efficiently manipulate in the compressed domain, spatial and/or temporal scaling of matching pursuit-coded digital signals. These manipulations, referred to as transcoding, may take place at a transcoding proxy located at an origin server, in any intermediary along the transmission path from the origin server to the client device, and/or at the client device. The preferred embodiment focuses on a method to perform rate adaptation and spatio-temporal scaling of a video stream composed of 3-D atoms in order to serve a set of heterogeneous client devices (e.g., a high-end personal computer, a personal digital assistant and a wireless phone). The proposed method applies to 1-D atoms (decomposition of audio signals) and 2-D atoms (image decomposition).