Sciweavers

839 search results - page 141 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
90
Voted
ICPR
2010
IEEE
15 years 5 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
98
Voted
CBMS
2001
IEEE
15 years 4 months ago
Automated Medical Citation Records Creation for Web-Based On-Line Journals
With the rapid expansion and utilization of the Internet and Web technologies, there is an increasing number of on-line medical journals. On-line journals pose new challenges in t...
Daniel X. Le, Loc Q. Tran, Joseph Chow, Jongwoo Ki...
94
Voted
VLDB
2004
ACM
108views Database» more  VLDB 2004»
15 years 6 months ago
QStream: Deterministic Querying of Data Streams
Current developments in processing data streams are based on the best-effort principle and therefore not adequate for many application areas. When sensor data is gathered by inte...
Sven Schmidt, Henrike Berthold, Wolfgang Lehner
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
15 years 5 months ago
ERACER: a database approach for statistical inference and data cleaning
Real-world databases often contain syntactic and semantic errors, in spite of integrity constraints and other safety measures incorporated into modern DBMSs. We present ERACER, an...
Chris Mayfield, Jennifer Neville, Sunil Prabhakar
106
Voted
WWW
2006
ACM
16 years 1 months ago
Probabilistic models for discovering e-communities
The increasing amount of communication between individuals in e-formats (e.g. email, Instant messaging and the Web) has motivated computational research in social network analysis...
Ding Zhou, Eren Manavoglu, Jia Li, C. Lee Giles, H...