Sciweavers

839 search results - page 112 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
111
Voted
HSNMC
2004
Springer
106views Multimedia» more  HSNMC 2004»
15 years 6 months ago
Performance Evaluation of a Probabilistic Packet Filter Optimization Algorithm for High-Speed Network Monitoring
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...
SC
2000
ACM
15 years 5 months ago
Dynamic Software Testing of MPI Applications with Umpire
As evidenced by the popularity of MPI (Message Passing Interface), message passing is an effective programming technique for managing coarse-grained concurrency on distributed com...
Jeffrey S. Vetter, Bronis R. de Supinski
KDD
2009
ACM
159views Data Mining» more  KDD 2009»
16 years 1 months ago
Mining brain region connectivity for alzheimer's disease study via sparse inverse covariance estimation
Effective diagnosis of Alzheimer's disease (AD), the most common type of dementia in elderly patients, is of primary importance in biomedical research. Recent studies have de...
Liang Sun, Rinkal Patel, Jun Liu, Kewei Chen, Tere...
98
Voted
SACMAT
2009
ACM
15 years 7 months ago
Evaluating role mining algorithms
While many role mining algorithms have been proposed in recent years, there lacks a comprehensive study to compare these algorithms. These role mining algorithms have been evaluat...
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, ...
119
Voted
CASON
2009
IEEE
15 years 7 months ago
Social Network - An Autonomous System Designed for Radio Recommendation
This paper describes the functions of a system proposed for the music tube recommendation from social network data base. Such a system enables the automatic collection, evaluation...
Grzegorz Dziczkowski, Lamine Bougueroua, Katarzyna...