Sciweavers

1298 search results - page 109 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
WWW
2005
ACM
15 years 9 months ago
X-warehouse: building query pattern-driven data
In this paper, we propose an approach to materialize XML data warehouses based on the frequent query patterns discovered from historical queries issued by users. The schemas of in...
Ji Zhang, Wei Wang, Han Liu, Sheng Zhang
USENIX
2003
15 years 4 months ago
A Cooperative Internet Backup Scheme
We present a novel peer-to-peer backup technique that allows computers connected to the Internet to back up their data cooperatively: Each computer has a set of partner computers,...
Mark Lillibridge, Sameh Elnikety, Andrew Birrell, ...
KDD
2002
ACM
191views Data Mining» more  KDD 2002»
16 years 3 months ago
Multimedia Knowledge Integration, Summarization And Evaluation
This paper presents new methods for automatically integrating, summarizing and evaluating multimedia knowledge. These are essential for multimedia applications to efficiently and ...
Ana B. Benitez, Shih-Fu Chang
151
Voted
BMCBI
2006
119views more  BMCBI 2006»
15 years 3 months ago
LS-NMF: A modified non-negative matrix factorization algorithm utilizing uncertainty estimates
Background: Non-negative matrix factorisation (NMF), a machine learning algorithm, has been applied to the analysis of microarray data. A key feature of NMF is the ability to iden...
Guoli Wang, Andrew V. Kossenkov, Michael F. Ochs
SOUPS
2006
ACM
15 years 9 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...