Sciweavers

487 search results - page 62 / 98
» Detecting Link Spam Using Temporal Information
Sort
View
IWCMC
2010
ACM
15 years 8 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 6 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
SIGMOD
2009
ACM
202views Database» more  SIGMOD 2009»
16 years 3 months ago
ZStream: a cost-based query processor for adaptively detecting composite events
Composite (or Complex) event processing (CEP) systems search sequences of incoming events for occurrences of userspecified event patterns. Recently, they have gained more attentio...
Yuan Mei, Samuel Madden
BMCBI
2007
141views more  BMCBI 2007»
15 years 3 months ago
A novel approach to detect hot-spots in large-scale multivariate data
Background: Progressive advances in the measurement of complex multifactorial components of biological processes involving both spatial and temporal domains have made it difficult...
Jianhua Wu, Keith M. Kendrick, Jianfeng Feng
BMCBI
2004
174views more  BMCBI 2004»
15 years 3 months ago
Implications for domain fusion protein-protein interactions based on structural information
Background: Several in silico methods exist that were developed to predict protein interactions from the copious amount of genomic and proteomic data. One of these methods is Doma...
Jer-Ming Chia, Prasanna R. Kolatkar