Sciweavers

1884 search results - page 280 / 377
» Abstraction from Counters: An Application on Real-Time Syste...
Sort
View
WISE
2006
Springer
15 years 4 months ago
2D/3D Web Visualization on Mobile Devices
Abstract. Visualization is able to present the rich Web information intuitively and make the Web search/mining more productive. Mobile computing is able to provide the flexibility...
Yi Wang, Li-Zhu Zhou, Jianhua Feng, Lei Xie, Chun ...
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
15 years 2 months ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
DPD
2002
97views more  DPD 2002»
14 years 9 months ago
Dictatorial Transaction Processing: Atomic Commitment Without Veto Right
The current standard in governing distributed transaction termination is the so-called Two-Phase Commit protocol (2PC). The first phase of 2PC is a voting phase, where the partici...
Maha Abdallah, Rachid Guerraoui, Philippe Pucheral
KI
2010
Springer
14 years 7 months ago
Local Adaptive Extraction of References
Abstract. The accurate extraction of scholarly reference information from scientific publications is essential for many useful applications like BIBTEX management systems or citati...
Peter Klügl, Andreas Hotho, Frank Puppe