Sciweavers

726 search results - page 52 / 146
» From Anomaly Reports to Cases
Sort
View
CCR
2000
111views more  CCR 2000»
14 years 11 months ago
Analysis of errors in network load measurements
The paper identifies elements in network monitoring systems that cause errors in the load measurements found in recent reports on network statistics from an academic backbone netw...
Stanislav Belenki, Sven Tafvelin
WWW
2007
ACM
16 years 15 days ago
Netprobe: a fast and scalable system for fraud detection in online auction networks
Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implemen...
Shashank Pandit, Duen Horng Chau, Samuel Wang, Chr...
JCDL
2005
ACM
100views Education» more  JCDL 2005»
15 years 5 months ago
Automatic extraction of titles from general documents using machine learning
In this paper, we propose a machine learning approach to title extraction from general documents. By general documents, we mean documents that can belong to any one of a number of...
Yunhua Hu, Hang Li, Yunbo Cao, Dmitriy Meyerzon, Q...
ISI
2006
Springer
14 years 11 months ago
Tracing the Event Evolution of Terror Attacks from On-Line News
Since the September 11th terror attack at New York in 2001, the frequency of terror attacks around the world has been increasing and it draws more attention of the public. On Janua...
Christopher C. Yang, Xiaodong Shi, Chih-Ping Wei
ECMDAFA
2007
Springer
122views Hardware» more  ECMDAFA 2007»
15 years 6 months ago
Model Transformation from OWL-S to BPEL Via SiTra
Although there are a large number of academic and industrial model transformation frameworks available, allowing specification, implementation, maintenance and documentation of mod...
Behzad Bordbar, Gareth Howells, Michael Evans, Ath...