Sciweavers

834 search results - page 150 / 167
» Analyzing Harmonic Monitoring Data Using Data Mining
Sort
View
NSPW
2003
ACM
15 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
SIGIR
2002
ACM
14 years 9 months ago
Web question answering: is more always better?
This paper describes a question answering system that is designed to capitalize on the tremendous amount of data that is now available online. Most question answering systems use ...
Susan T. Dumais, Michele Banko, Eric Brill, Jimmy ...
BMCBI
2002
110views more  BMCBI 2002»
14 years 9 months ago
Identifying functional relationships among human genes by systematic analysis of biological literature
Background: The availability of biomedical literature in electronic format has made it possible to implement automatic text processing methods to expose implicit relationships amo...
Yong-Chuan Tao, Rudolph L. Leibel
ICC
2009
IEEE
142views Communications» more  ICC 2009»
15 years 4 months ago
Revealing Social Networks of Spammers Through Spectral Clustering
—To date, most studies on spam have focused only on the spamming phase of the spam cycle and have ignored the harvesting phase, which consists of the mass acquisition of email ad...
Kevin S. Xu, Mark Kliger, Yilun Chen, Peter J. Woo...
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 3 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif