Sciweavers

839 search results - page 102 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
107
Voted
FLAIRS
2006
15 years 2 months ago
Evaluation of the q-matrix Method in Understanding Student Logic Proofs
In building intelligent tutoring systems, it is critical to be able to understand and diagnose student responses in interactive problem solving. We present a novel application of ...
Tiffany Barnes
111
Voted
KDD
2005
ACM
170views Data Mining» more  KDD 2005»
16 years 1 months ago
Parallel mining of closed sequential patterns
Discovery of sequential patterns is an essential data mining task with broad applications. Among several variations of sequential patterns, closed sequential pattern is the most u...
Shengnan Cong, Jiawei Han, David A. Padua
92
Voted
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 5 months ago
ERSA: Error Resilient System Architecture for probabilistic applications
There is a growing concern about the increasing vulnerability of future computing systems to errors in the underlying hardware. Traditional redundancy techniques are expensive for...
Larkhoon Leem, Hyungmin Cho, Jason Bau, Quinn A. J...
102
Voted
WWW
2006
ACM
16 years 1 months ago
Detecting spam web pages through content analysis
In this paper, we continue our investigations of "web spam": the injection of artificially-created pages into the web in order to influence the results from search engin...
Alexandros Ntoulas, Marc Najork, Mark Manasse, Den...
111
Voted
VMV
2001
105views Visualization» more  VMV 2001»
15 years 2 months ago
Facial Reconstruction Using Volumetric Data
In this paper we demonstrate computer aided techniques in the area of the reconstruction of facial features from skeletal remains. We outline the desired features of a system for ...
Mark W. Jones