Sciweavers

2018 search results - page 98 / 404
» Code Normal Forms
Sort
View
88
Voted
DSN
2003
IEEE
15 years 7 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
107
Voted
CIAC
2010
Springer
194views Algorithms» more  CIAC 2010»
15 years 7 months ago
An Algorithmic Framework for Motif Discovery Problems in Weighted Sequences
A weighted sequence is a string in which a set of characters may appear at each position with respective probabilities of occurrence. A common task is to locate a given motif in a ...
Hui Zhang, Qing Guo, Costas S. Iliopoulos
ASWC
2006
Springer
15 years 6 months ago
Transformation from OWL Description to Resource Space Model
Abstract. Semantics shows diversity in real world, document world, mental abstraction world and machine world. Transformation between semantics pursues the uniformity in the divers...
Hai Zhuge, Peng Shi, Yunpeng Xing, Chao He
ICVGIP
2004
15 years 3 months ago
Improved Cut-Based Foreground Identification
Automatic content based schemes, as opposed to those with human endeavor, have become important as users attempt to organize massive data presented in the form of multimedia data ...
Sharat Chandran, Satwik Hebbar, Vishal Mamania, Ab...
CORR
2010
Springer
161views Education» more  CORR 2010»
15 years 2 months ago
Database Reverse Engineering based on Association Rule Mining
Maintaining a legacy database is a difficult task especially when system documentation is poor written or even missing. Database reverse engineering is an attempt to recover high-...
Nattapon Pannurat, Nittaya Kerdprasop, Kittisak Ke...