Sciweavers

27 search results - page 5 / 6
» Data Quality in HL7 Messages - A Real Case Analysis
Sort
View
NIPS
2008
13 years 6 months ago
Improved Moves for Truncated Convex Models
We consider the problem of obtaining the approximate maximum a posteriori estimate of a discrete random field characterized by pairwise potentials that form a truncated convex mod...
M. Pawan Kumar, Philip H. S. Torr
DAS
2004
Springer
13 years 10 months ago
Automatic Fax Routing
Abstract. We present a system for automatic FAX routing which processes incoming FAX images and forwards them to the correct email alias. The system first performs optical charact...
Paul A. Viola, James Rinker, Martin Law
EDBT
2006
ACM
191views Database» more  EDBT 2006»
14 years 5 months ago
Distributed Spatial Clustering in Sensor Networks
Abstract. Sensor networks monitor physical phenomena over large geographic regions. Scientists can gain valuable insight into these phenomena, if they understand the underlying dat...
Anand Meka, Ambuj K. Singh
KDD
2005
ACM
161views Data Mining» more  KDD 2005»
14 years 5 months ago
Combining email models for false positive reduction
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
Shlomo Hershkop, Salvatore J. Stolfo
TNC
2004
120views Education» more  TNC 2004»
13 years 6 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer