Sciweavers

Share
ACMACE
2010
ACM
9 years 2 months ago
Exploiting MMORPG log data toward efficient RMT player detection
To detect players who are engaged in real-money trading (RMT) in massively multi-player online role-playing games (MMORPGs), behavior of players was analyzed using log data of a c...
Hiroshi Itsuki, Asuka Takeuchi, Atsushi Fujita, Hi...
MMS
2006
9 years 7 months ago
Collaborative image retrieval via regularized metric learning
In content-based image retrieval (CBIR), relevant images are identified based on their similarities to query images. Most CBIR algorithms are hindered by the semantic gap between ...
Luo Si, Rong Jin, Steven C. H. Hoi, Michael R. Lyu
CISIS
2007
IEEE
9 years 7 months ago
Gridifying IBM's Generic Log Adapter to Speed-Up the Processing of Log Data
Problem determination in today's computing environments consumes between 30 and 70% of an organization’s IT resources and represents from one third to one half of their tot...
Claudi Paniagua, Fatos Xhafa, Thanasis Daradoumis
CLEF
2009
Springer
9 years 8 months ago
LogCLEF 2009: The CLEF 2009 Multilingual Logfile Analysis Track Overview
Log data constitute a relevant aspect in the evaluation process of the quality of a search engine and the quality of a multilingual search service; log data can be used to study t...
Thomas Mandl, Maristella Agosti, Giorgio Maria Di ...
CLEF
2010
Springer
9 years 8 months ago
LogCLEF 2010: the CLEF 2010 Multilingual Logfile Analysis Track Overview
Log data constitutes a relevant aspect in the evaluation process of multilingual search services. Activity logs allow to study the usage of search engines and to better adapt them ...
Thomas Mandl, Giorgio Maria Di Nunzio, Julia Maria...
AUSAI
2006
Springer
9 years 11 months ago
Modular Bayesian Networks for Inferring Landmarks on Mobile Daily Life
Abstract. Mobile devices get to handle much information thanks to the convergence of diverse functionalities. Their environment has great potential of supporting customized service...
Keum-Sung Hwang, Sung-Bae Cho
ACSAC
2004
IEEE
9 years 11 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
IDEAS
1997
IEEE
110views Database» more  IDEAS 1997»
9 years 11 months ago
Accommodating Logical Logging under Fuzzy Checkpointing in Main Memory Databases
This paper presents a simple and effective method to reduce the size of log data for recovery in main memory databases. Fuzzy checkpointing is known to be very efficient in main ...
Seung-Kyoon Woo, Myoung-Ho Kim, Yoon-Joon Lee
ITS
2010
Springer
178views Multimedia» more  ITS 2010»
9 years 12 months ago
Learning What Works in ITS from Non-traditional Randomized Controlled Trial Data
The traditional, well established approach to finding out what works in education research is to run a randomized controlled trial (RCT) using a standard pretest and posttest desig...
Zachary A. Pardos, Matthew D. Dailey, Neil T. Heff...
HICSS
2002
IEEE
91views Biometrics» more  HICSS 2002»
10 years 3 days ago
Evaluation of User Search in a Web-Database
The number of Web-databases has exploded during the last years. In order to justify the development of new information resources, it is essential to know if the use of existing re...
Joan C. Nordbotten, Svein Nordbotten
books