Sciweavers

1036 search results - page 100 / 208
» Evaluating Mixed-Initiative Systems: An Experimental Approac...
Sort
View
ISICA
2009
Springer
15 years 5 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
SIGMOD
2010
ACM
201views Database» more  SIGMOD 2010»
14 years 11 months ago
I4E: interactive investigation of iterative information extraction
Information extraction systems are increasingly being used to mine structured information from unstructured text documents. A commonly used unsupervised technique is to build iter...
Anish Das Sarma, Alpa Jain, Divesh Srivastava
SSD
2005
Springer
122views Database» more  SSD 2005»
15 years 4 months ago
Selectivity Estimation of High Dimensional Window Queries via Clustering
Abstract. Query optimization is an important functionality of modern database systems and often based on estimating the selectivity of queries before actually executing them. Well-...
Christian Böhm, Hans-Peter Kriegel, Peer Kr&o...
DAWAK
2008
Springer
15 years 1 months ago
Efficient Data Distribution for DWS
The DWS (Data Warehouse Striping) technique is a data partitioning approach especially designed for distributed data warehousing environments. In DWS the fact tables are distribute...
Raquel Almeida, Jorge Vieira, Marco Vieira, Henriq...
PCI
2005
Springer
15 years 4 months ago
Protein Classification with Multiple Algorithms
Nowadays, the number of protein sequences being stored in central protein databases from labs all over the world is constantly increasing. From these proteins only a fraction has b...
Sotiris Diplaris, Grigorios Tsoumakas, Pericles A....