Sciweavers

706 search results - page 126 / 142
» A Methodology for Evaluating and Selecting Data Mining Softw...
Sort
View
EXPCS
2007
15 years 1 months ago
An analysis of XML compression efficiency
XML simplifies data exchange among heterogeneous computers, but it is notoriously verbose and has spawned the development of many XML-specific compressors and binary formats. We p...
Christopher J. Augeri, Dursun A. Bulutoglu, Barry ...
RAID
2001
Springer
15 years 1 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
WCRE
2009
IEEE
15 years 4 months ago
Autumn Leaves: Curing the Window Plague in IDEs
—Navigating large software systems is difficult as the various artifacts are distributed in a huge space, while the relationships between different artifacts often remain hidden...
David Röthlisberger, Oscar Nierstrasz, St&eac...
CIDM
2009
IEEE
15 years 2 months ago
An architecture and algorithms for multi-run clustering
—This paper addresses two main challenges for clustering which require extensive human effort: selecting appropriate parameters for an arbitrary clustering algorithm and identify...
Rachsuda Jiamthapthaksin, Christoph F. Eick, Vadee...
BMCBI
2004
97views more  BMCBI 2004»
14 years 9 months ago
Performance of a genetic algorithm for mass spectrometry proteomics
Background: Recently, mass spectrometry data have been mined using a genetic algorithm to produce discriminatory models that distinguish healthy individuals from those with cancer...
Neal O. Jeffries