Sciweavers

102 search results - page 21 / 21
» Identifying Useful Passages in Documents Based on Annotation...
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 6 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
13 years 12 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...