Sciweavers

776 search results - page 151 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
PLDI
2011
ACM
14 years 2 months ago
Isolating and understanding concurrency errors using reconstructed execution fragments
In this paper we propose Recon, a new general approach to concurrency debugging. Recon goes beyond just detecting bugs, it also presents to the programmer short fragments of buggy...
Brandon Lucia, Benjamin P. Wood, Luis Ceze
SMC
2007
IEEE
150views Control Systems» more  SMC 2007»
15 years 5 months ago
An intelligent knowledge sharing system for web communities
— This paper presents the prototype of an expert peering system for information exchange in the knowledge society. Our system realizes an intelligent, real-time search engine for...
Christian Bauckhage, Tansu Alpcan, Sachin Agarwal,...
112
Voted
BMCBI
2010
214views more  BMCBI 2010»
14 years 11 months ago
AutoSOME: a clustering method for identifying gene expression modules without prior knowledge of cluster number
Background: Clustering the information content of large high-dimensional gene expression datasets has widespread application in "omics" biology. Unfortunately, the under...
Aaron M. Newman, James B. Cooper
EDBT
2009
ACM
277views Database» more  EDBT 2009»
15 years 4 months ago
G-hash: towards fast kernel-based similarity search in large graph databases
Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and simila...
Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald ...
96
Voted
NIPS
2003
15 years 1 months ago
Nonlinear Filtering of Electron Micrographs by Means of Support Vector Regression
Nonlinear filtering can solve very complex problems, but typically involve very time consuming calculations. Here we show that for filters that are constructed as a RBF network ...
Roland Vollgraf, Michael Scholz, Ian A. Meinertzha...