Sciweavers

205 search results - page 34 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
68
Voted
WSDM
2009
ACM
148views Data Mining» more  WSDM 2009»
15 years 4 months ago
Information arbitrage across multi-lingual Wikipedia
The rapid globalization of Wikipedia is generating a parallel, multi-lingual corpus of unprecedented scale. Pages for the same topic in many different languages emerge both as a r...
Eytan Adar, Michael Skinner, Daniel S. Weld
63
Voted
AUSDM
2006
Springer
114views Data Mining» more  AUSDM 2006»
15 years 1 months ago
Consolidated Trees: An Analysis of Structural Convergence
When different subsamples of the same data set are used to induce classification trees, the structure of the built classifiers is very different. The stability of the structure of ...
Jesús M. Pérez, Javier Muguerza, Ola...
98
Voted
AIPS
2008
14 years 12 months ago
A Temporal Logic-Based Planning and Execution Monitoring System
As no plan can cover all possible contingencies, the ability to detect failures during plan execution is crucial to the robustness of any autonomous system operating in a dynamic ...
Jonas Kvarnström, Fredrik Heintz, Patrick Doh...
84
Voted
AGENTS
2000
Springer
15 years 1 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
91
Voted
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
12 years 12 months ago
Ego-centric Graph Pattern Census
—There is increasing interest in analyzing networks of all types including social, biological, sensor, computer, and transportation networks. Broadly speaking, we may be interest...
Walaa Eldin Moustafa, Amol Deshpande, Lise Getoor