Sciweavers

839 search results - page 136 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
PVLDB
2010
111views more  PVLDB 2010»
14 years 7 months ago
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic
The ever-increasing number of intrusions in public and commercial networks has created the need for high-speed archival solutions that continuously store streaming network data to...
Francesco Fusco, Marc Ph. Stoecklin, Michail Vlach...
JAISE
2010
182views Algorithms» more  JAISE 2010»
14 years 7 months ago
Exploring semantics in activity recognition using context lattices
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Juan Ye, Simon Dobson
90
Voted
DATE
2004
IEEE
133views Hardware» more  DATE 2004»
15 years 4 months ago
Channel Decoder Architecture for 3G Mobile Wireless Terminals
Channel coding is a key element of any digital wireless communication system since it minimizes the effects of noise and interference on the transmitted signal. In thirdgeneration...
Friedbert Berens, Gerd Kreiselmaier, Norbert Wehn
85
Voted
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
15 years 6 months ago
Predicting the product purchase patterns of corporate customers
This paper describes TIPPPS (Time Interleaved Product Purchase Prediction System), which analyses billing data of corporate customers in a large telecommunications company in orde...
Bhavani Raskutti, Alan Herschtal
KDD
2002
ACM
148views Data Mining» more  KDD 2002»
16 years 1 months ago
Tumor cell identification using features rules
Advances in imaging techniques have led to large repositories of images. There is an increasing demand for automated systems that can analyze complex medical images and extract me...
Bin Fang, Wynne Hsu, Mong-Li Lee