Sciweavers

205 search results - page 33 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
98
Voted
IQIS
2004
ACM
15 years 3 months ago
Mining for Patterns in Contradictory Data
Information integration is often faced with the problem that different data sources represent the same set of the real-world objects, but give conflicting values for specific prop...
Heiko Müller, Ulf Leser, Johann Christoph Fre...
DAWAK
2008
Springer
14 years 11 months ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit
DAC
2006
ACM
15 years 10 months ago
Behavior and communication co-optimization for systems with sequential communication media
In this paper we propose a new communication synthesis approach targeting systems with sequential communication media (SCM). Since SCMs require that the reading sequence and writi...
Jason Cong, Yiping Fan, Guoling Han, Wei Jiang, Zh...
IJCAI
2003
14 years 11 months ago
Bayesian Information Extraction Network
Dynamic Bayesian networks (DBNs) offer an elegant way to integrate various aspects of language in one model. Many existing algorithms developed for learning and inference in DBNs ...
Leonid Peshkin, Avi Pfeffer
SPIESR
2003
230views Database» more  SPIESR 2003»
14 years 11 months ago
Bridging the semantic gap in sports
One of the major challenges facing current media management systems and related applications is the so-called ‘‘semantic gap’’ between the rich meaning that a user desires...
Baoxin Li, James H. Errico, Hao Pan, M. Ibrahim Se...