Sciweavers

375 search results - page 55 / 75
» Automatic Event Extraction with Structured Preference Modeli...
Sort
View
107
Voted
TON
2008
102views more  TON 2008»
15 years 11 days ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
109
Voted
SIGIR
2008
ACM
15 years 12 days ago
Latent dirichlet allocation based multi-document summarization
Extraction based Multi-Document Summarization Algorithms consist of choosing sentences from the documents using some weighting mechanism and combining them into a summary. In this...
Rachit Arora, Balaraman Ravindran
99
Voted
EXPERT
2011
131views more  EXPERT 2011»
14 years 4 months ago
Grid Monitoring and Market Risk Management
—With the rapid development of the electricity market, both grid and market operations need to be carefully coordinated and monitored in real time. This paper focuses on system m...
Yufan Guan, Mladen Kezunovic
SIGOPS
2010
162views more  SIGOPS 2010»
14 years 11 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
106
Voted
KDD
2007
ACM
155views Data Mining» more  KDD 2007»
16 years 27 days ago
Mining templates from search result records of search engines
Metasearch engine, Comparison-shopping and Deep Web crawling applications need to extract search result records enwrapped in result pages returned from search engines in response ...
Hongkun Zhao, Weiyi Meng, Clement T. Yu