Sciweavers

17129 search results - page 3268 / 3426
» Applied Computing
Sort
View
IAT
2008
IEEE
15 years 9 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
CIKM
2007
Springer
15 years 9 months ago
Regularized locality preserving indexing via spectral regression
We consider the problem of document indexing and representation. Recently, Locality Preserving Indexing (LPI) was proposed for learning a compact document subspace. Different from...
Deng Cai, Xiaofei He, Wei Vivian Zhang, Jiawei Han
ITC
2003
IEEE
151views Hardware» more  ITC 2003»
15 years 8 months ago
Fault Collapsing via Functional Dominance
A fault fj is said to dominate another fault fi if all tests for fi detect fj . When two faults dominate each other, they are called equivalent. Dominance and equivalence relation...
Vishwani D. Agrawal, A. V. S. S. Prasad, Madhusuda...
IDMS
1997
Springer
188views Multimedia» more  IDMS 1997»
15 years 6 months ago
An Approach for an Adaptive Visualization in a Mobile Environment
With the evolving availability of wireless communication servicesand of affordable mobile devices such as notebooks or Personal Digital Assistants, mobile computing is becoming wid...
Luc Neumann, Alberto Barbosa Raposo
BMCBI
2007
103views more  BMCBI 2007»
15 years 3 months ago
Systems biology approach for mapping the response of human urothelial cells to infection by Enterococcus faecalis
Background: To better understand the response of urinary epithelial (urothelial) cells to Enterococcus faecalis, a uropathogen that exhibits resistance to multiple antibiotics, a ...
Mikhail G. Dozmorov, Kimberly D. Kyker, Ricardo Sa...
« Prev « First page 3268 / 3426 Last » Next »