Sciweavers

1266 search results - page 100 / 254
» Detecting Inconsistencies in Distributed Data
Sort
View
125
Voted
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
16 years 1 months ago
Cost-effective outbreak detection in networks
Given a water distribution network, where should we place sensors to quickly detect contaminants? Or, which blogs should we read to avoid missing important stories? These seemingl...
Andreas Krause, Carlos Guestrin, Christos Faloutso...
136
Voted
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
15 years 10 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
119
Voted
IPMI
2009
Springer
16 years 2 months ago
Fully-Automated White Matter Hyperintensity Detection With Anatomical Prior Knowledge and Without FLAIR
This paper presents a method for detection of cerebral white matter hyperintensities (WMH) based on run-time PD-, T1-, and T2weighted structural magnetic resonance (MR) images of t...
Charles DeCarli, Christopher Schwarz, Evan Fletche...
106
Voted
ISSADS
2005
Springer
15 years 6 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
120
Voted
DSN
2004
IEEE
15 years 4 months ago
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are bei...
Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Si...