Sciweavers

1503 search results - page 231 / 301
» Detecting Anomalies in Graphs
Sort
View
DASC
2006
IEEE
15 years 1 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
ICVGIP
2004
14 years 11 months ago
Improved Cut-Based Foreground Identification
Automatic content based schemes, as opposed to those with human endeavor, have become important as users attempt to organize massive data presented in the form of multimedia data ...
Sharat Chandran, Satwik Hebbar, Vishal Mamania, Ab...
CIKM
2010
Springer
14 years 8 months ago
Building recommendation systems using peer-to-peer shared content
Peer-to-Peer (p2p) networks are used for sharing content by millions of users. Often, meta-data used for searching is missing or wrong, making it difficult for users to find cont...
Yuval Shavitt, Ela Weinsberg, Udi Weinsberg
TWC
2008
145views more  TWC 2008»
14 years 8 months ago
Generalized Window-Based PN Acquisition Scheme in CDMA Spread Spectrum Systems
In this letter, we propose a generalized version of the window-based pseudonoise (PN) acquisition scheme verifying one or more best hypotheses rather than the best one per search w...
Kwang Man Ok, Chung Gu Kang
WWW
2008
ACM
15 years 10 months ago
Social and semantics analysis via non-negative matrix factorization
Social media such as Web forum often have dense interactions between user and content where network models are often appropriate for analysis. Joint non-negative matrix factorizat...
Zhi-Li Wu, Chi-Wa Cheng, Chun-hung Li