Sciweavers

839 search results - page 149 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
124
Voted
WSDM
2012
ACM
301views Data Mining» more  WSDM 2012»
13 years 8 months ago
Learning evolving and emerging topics in social media: a dynamic nmf approach with temporal regularization
As massive repositories of real-time human commentary, social media platforms have arguably evolved far beyond passive facilitation of online social interactions. Rapid analysis o...
Ankan Saha, Vikas Sindhwani
120
Voted
HT
2006
ACM
15 years 6 months ago
HT06, tagging paper, taxonomy, Flickr, academic article, to read
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., “tags”) to Internet resources (e.g., web pages, images, vi...
Cameron Marlow, Mor Naaman, Danah Boyd, Marc Davis
107
Voted
TITS
2008
112views more  TITS 2008»
15 years 22 days ago
An Efficient Approach to Onboard Stereo Vision System Pose Estimation
Abstract--This paper presents an efficient technique for estimating the pose of an onboard stereo vision system relative to the environment's dominant surface area, which is s...
Angel Domingo Sappa, Fadi Dornaika, Daniel Ponsa, ...
97
Voted
ISSRE
2003
IEEE
15 years 6 months ago
An Empirical Study on Testing and Fault Tolerance for Software Reliability Engineering
Software testing and software fault tolerance are two major techniques for developing reliable software systems, yet limited empirical data are available in the literature to eval...
Michael R. Lyu, Zubin Huang, Sam K. S. Sze, Xia Ca...
102
Voted
JCDL
2004
ACM
170views Education» more  JCDL 2004»
15 years 6 months ago
Looking for new, not known music only: music retrieval by melody style
With the growth of digital music, content-based music retrieval (CBMR) has attracted increasingly attention. For most CBMR systems, the task is to return music objects similar to ...
Fang-Fei Kuo, Man-Kwan Shan