Sciweavers

2556 search results - page 433 / 512
» Clustering processes
Sort
View
147
Voted
IRI
2005
IEEE
15 years 9 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
128
Voted
IV
2005
IEEE
130views Visualization» more  IV 2005»
15 years 9 months ago
A Comparison of Visual and Haptic Object Representations Based on Similarity
Do we judge similarity between two objects to be the same using touch and vision? We investigated this using psychophysical experiments in which subjects rated the similarity betw...
Theresa Cooke, Christian Wallraven, Heinrich H. B&...
97
Voted
IUI
2005
ACM
15 years 9 months ago
Automated email activity management: an unsupervised learning approach
Many structured activities are managed by email. For instance, a consumer purchasing an item from an e-commerce vendor may receive a message confirming the order, a warning of a ...
Nicholas Kushmerick, Tessa A. Lau
113
Voted
PADS
2005
ACM
15 years 9 months ago
Concurrent Replication of Parallel and Distributed Simulations
Parallel and distributed simulations enable the analysis of complex systems by concurrently exploiting the aggregate computation power and memory of clusters of execution units. I...
Luciano Bononi, Michele Bracuto, Gabriele D'Angelo...
145
Voted
ATAL
2005
Springer
15 years 9 months ago
T-Man: Gossip-Based Overlay Topology Management
Overlay topology plays an important role in P2P systems. Topology serves as a basis for achieving functions such as routing, searching and information dissemination, and it has a m...
Márk Jelasity, Özalp Babaoglu