Sciweavers

4272 search results - page 723 / 855
» A Case for Automatic System Evaluation
Sort
View
USS
2004
14 years 11 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
INTERACT
2003
14 years 11 months ago
Godzilla: Seamless 2D and 3D Sketch Environment for Reflective and Creative Design Work
The rapid development of information technology has enabled many systems that support creative work. However, it has gradually become obvious that the latest information systems h...
Shun'ichi Tano, T. Kodera, T. Nakashima, I. Kawano...
JASIS
2006
164views more  JASIS 2006»
14 years 10 months ago
A study of interface support mechanisms for interactive information retrieval
Advances in search technology have meant that search systems can now offer assistance to users beyond simply retrieving a set of documents. For example, search systems are now cap...
Ryen W. White, Ian Ruthven
TKDE
2008
125views more  TKDE 2008»
14 years 10 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
FAST
2011
14 years 1 months ago
FAST: Quick Application Launch on Solid-State Drives
Application launch performance is of great importance to system platform developers and vendors as it greatly affects the degree of users’ satisfaction. The single most effectiv...
Yongsoo Joo, Junhee Ryu, Sangsoo Park, Kang G. Shi...