Sciweavers

839 search results - page 145 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
118
Voted
KDD
2007
ACM
153views Data Mining» more  KDD 2007»
16 years 1 months ago
Exploiting duality in summarization with deterministic guarantees
Summarization is an important task in data mining. A major challenge over the past years has been the efficient construction of fixed-space synopses that provide a deterministic q...
Panagiotis Karras, Dimitris Sacharidis, Nikos Mamo...
114
Voted
ICLP
2001
Springer
15 years 5 months ago
On a Tabling Engine That Can Exploit Or-Parallelism
Tabling is an implementation technique that improves the declarativeness and expressiveness of Prolog by reusing solutions to goals. Quite a few interesting applications of tabling...
Ricardo Rocha, Fernando M. A. Silva, Vítor ...
89
Voted
BIOCOMP
2006
15 years 2 months ago
Finding Molecular Signature of Prostate Cancer: An Algorithmic Approach
123 African American men in America are 65% more likely to develop prostate cancer and are two to three times more likely to die of the disease than Caucasian men [1]. While resear...
Patrick Bobbie, Renee Reams, Sandra Suther, C. Per...
WWW
2008
ACM
16 years 1 months ago
Yes, there is a correlation: - from social networks to personal behavior on the web
Characterizing the relationship that exists between a person's social group and his/her personal behavior has been a long standing goal of social network analysts. In this pa...
Parag Singla, Matthew Richardson
CORR
2006
Springer
186views Education» more  CORR 2006»
15 years 26 days ago
SASE: Complex Event Processing over Streams
RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of dat...
Daniel Gyllstrom, Eugene Wu 0002, Hee-Jin Chae, Ya...