Sciweavers

1298 search results - page 200 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
SIGMOD
2006
ACM
111views Database» more  SIGMOD 2006»
16 years 3 months ago
Reconciling while tolerating disagreement in collaborative data sharing
In many data sharing settings, such as within the biological and biomedical communities, global data consistency is not always attainable: different sites' data may be dirty,...
Nicholas E. Taylor, Zachary G. Ives
AVI
2006
15 years 4 months ago
Line graph explorer: scalable display of line graphs using Focus+Context
Scientific measurements are often depicted as line graphs. Stateof-the-art high throughput systems in life sciences, telemetry and electronics measurement rapidly generate hundred...
Robert Kincaid, Heidi Lam
ICDM
2008
IEEE
235views Data Mining» more  ICDM 2008»
15 years 9 months ago
DECK: Detecting Events from Web Click-Through Data
In the past few years there has been increased research interest in detecting previously unidentified events from Web resources. Our focus in this paper is to detect events from ...
Ling Chen 0002, Yiqun Hu, Wolfgang Nejdl
141
Voted
CLEAR
2007
Springer
134views Biometrics» more  CLEAR 2007»
15 years 9 months ago
The ICSI RT07s Speaker Diarization System
Abstract. In this paper, we present the ICSI speaker diarization system. This system was used in the 2007 National Institute of Standards and Technology (NIST) Rich Transcription e...
Chuck Wooters, Marijn Huijbregts
135
Voted
HICSS
2006
IEEE
133views Biometrics» more  HICSS 2006»
15 years 9 months ago
Being Literate with Large Document Collections: Observational Studies and Cost Structure Tradeoffs
How do people work with large document collections? We studied the effects of different kinds of analysis tools on the behavior of people doing rapid large-volume data assessment,...
Daniel M. Russell, Malcolm Slaney, Yan Qu, Mave Ho...