Sciweavers

366 search results - page 69 / 74
» Development of Large Scientific Knowledge Bases
Sort
View
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
KES
2004
Springer
15 years 3 months ago
Decision Support System on the Grid
Aero engines are extremely reliable machines and operational failures are rare. However, currently great effort is being put into reducing the number of in-flight engine shutdowns,...
Max Ong, Xiaoxu Ren, J. Allan, Visakan Kadirkamana...
82
Voted
WSC
2004
14 years 11 months ago
Using Simulated Data in Support of Research on Regression Analysis
Using simulated data to develop and study diagnostic tools for data analysis is very beneficial. The user can gain insight about what happens when assumptions are violated since t...
Christopher Michael Hill, Linda C. Malone
WWW
2009
ACM
15 years 10 months ago
An axiomatic approach for result diversification
Understanding user intent is key to designing an effective ranking system in a search engine. In the absence of any explicit knowledge of user intent, search engines want to diver...
Sreenivas Gollapudi, Aneesh Sharma
EDBT
2009
ACM
195views Database» more  EDBT 2009»
15 years 4 months ago
Anonymizing moving objects: how to hide a MOB in a crowd?
Moving object databases (MOD) have gained much interest in recent years due to the advances in mobile communications and positioning technologies. Study of MOD can reveal useful i...
Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshm...