Sciweavers

1021 search results - page 180 / 205
» An Effective Visualization and Analysis Method for Edge Meas...
Sort
View
62
Voted
WWW
2009
ACM
15 years 10 months ago
Ranking community answers via analogical reasoning
Due to the lexical gap between questions and answers, automatically detecting right answers becomes very challenging for community question-answering sites. In this paper, we prop...
Xudong Tu, Xin-Jing Wang, Dan Feng, Lei Zhang
AUSDM
2007
Springer
140views Data Mining» more  AUSDM 2007»
15 years 3 months ago
The application of data mining techniques to characterize agricultural soil profiles
The advances in computing and information storage have provided vast amounts of data. The challenge has been to extract knowledge from this raw data; this has lead to new methods ...
Leisa Armstrong, Dean Diepeveen, Rowan Maddern
70
Voted
CCS
2007
ACM
15 years 3 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
SSDBM
2005
IEEE
218views Database» more  SSDBM 2005»
15 years 3 months ago
The "Best K" for Entropy-based Categorical Data Clustering
With the growing demand on cluster analysis for categorical data, a handful of categorical clustering algorithms have been developed. Surprisingly, to our knowledge, none has sati...
Keke Chen, Ling Liu
84
Voted
ML
2010
ACM
155views Machine Learning» more  ML 2010»
14 years 8 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...