Sciweavers

50 search results - page 10 / 10
» Business process impact visualization and anomaly detection
Sort
View
DATAMINE
2007
135views more  DATAMINE 2007»
13 years 5 months ago
Experiencing SAX: a novel symbolic representation of time series
Many high level representations of time series have been proposed for data mining, including Fourier transforms, wavelets, eigenwaves, piecewise polynomial models etc. Many researc...
Jessica Lin, Eamonn J. Keogh, Li Wei, Stefano Lona...
WECWIS
2003
IEEE
132views ECommerce» more  WECWIS 2003»
13 years 11 months ago
Page Digest for Large-Scale Web Services
The rapid growth of the World Wide Web and the Internet has fueled interest in Web services and the Semantic Web, which are quickly becoming important parts of modern electronic c...
Daniel Rocco, David Buttler, Ling Liu
DSN
2004
IEEE
13 years 9 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
WCRE
1999
IEEE
13 years 10 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
BMCBI
2005
101views more  BMCBI 2005»
13 years 5 months ago
MASQOT: a method for cDNA microarray spot quality control
Background: cDNA microarray technology has emerged as a major player in the parallel detection of biomolecules, but still suffers from fundamental technical problems. Identifying ...
Max Bylesjö, Daniel Eriksson, Andreas Sjö...