Sciweavers

839 search results - page 138 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
116
Voted
SISAP
2010
IEEE
159views Data Mining» more  SISAP 2010»
14 years 11 months ago
CP-index: using clustering and pivots for indexing non-metric spaces
Most multimedia information retrieval systems use an indexing scheme to speed up similarity search. The index aims to discard large portions of the data collection at query time. ...
Victor Sepulveda, Benjamin Bustos
CONSTRAINTS
2008
182views more  CONSTRAINTS 2008»
15 years 27 days ago
Constraint Programming in Structural Bioinformatics
Bioinformatics aims at applying computer science methods to the wealth of data collected in a variety of experiments in life sciences (e.g. cell and molecular biology, biochemistry...
Pedro Barahona, Ludwig Krippahl
CASES
2008
ACM
15 years 2 months ago
A light-weight cache-based fault detection and checkpointing scheme for MPSoCs enabling relaxed execution synchronization
While technology advances have made MPSoCs a standard architecture for embedded systems, their applicability is increasingly being challenged by dramatic increases in the amount o...
Chengmo Yang, Alex Orailoglu
121
Voted
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
15 years 1 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
90
Voted
DMIN
2006
105views Data Mining» more  DMIN 2006»
15 years 2 months ago
Development of an Optimal Neural Network for Avalanche Forecast in Himalayan Region
- This paper deals with the application of a well-known data mining technique, multi-layer back-propagation neural network, for forecasting of an avalanche in Himalayan region. Met...
Rashpal Kaur, Mahesh Bansal, Atul Parti, V. Rihani