Sciweavers

1265 search results - page 84 / 253
» Better Burst Detection
Sort
View
ECIR
2010
Springer
14 years 8 months ago
Improving Medical Information Retrieval with PICO Element Detection
Without a well formulated and structured question, it can be very difficult and time consuming for physicians to identify appropriate resources and search for the best available ev...
Florian Boudin, Lixin Shi, Jian-Yun Nie
RAID
2010
Springer
14 years 8 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
IS
2011
14 years 1 months ago
Detecting proximity events in sensor networks
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or the surveillance of enemy forces in military applications. In this paper we int...
Antonios Deligiannakis, Yannis Kotidis
INFOCOM
2011
IEEE
14 years 1 months ago
SigSag: Iterative detection through soft message-passing
—The multiple-access framework of ZigZag decoding [1] is a useful technique for combating interference via multiple repeated transmissions, and is known to be compatible with dis...
Arash Saber Tehrani, Alexandros G. Dimakis, Michae...
SIGSOFT
2007
ACM
15 years 10 months ago
Efficient token based clone detection with flexible tokenization
Code clones are similar code fragments that occur at multiple locations in a software system. Detection of code clones provides useful information for maintenance, reengineering, ...
Hamid Abdul Basit, Stan Jarzabek