Sciweavers

897 search results - page 95 / 180
» Identity: How to name it, How to find it
Sort
View
KDD
2012
ACM
221views Data Mining» more  KDD 2012»
13 years 4 months ago
Fast mining and forecasting of complex time-stamped events
Given huge collections of time-evolving events such as web-click logs, which consist of multiple attributes (e.g., URL, userID, timestamp), how do we find patterns and trends? Ho...
Yasuko Matsubara, Yasushi Sakurai, Christos Falout...
CCS
2006
ACM
15 years 5 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
109
Voted
CMG
2001
15 years 3 months ago
Jump Start Your Performance Career Using Analytic Modeling
What is the career path for a performance analyst? A capacity planner? Most technicians paid their dues in the trenches of systems programming or operations. Having done it all, t...
Denise P. Kalm
115
Voted
IV
2003
IEEE
200views Visualization» more  IV 2003»
15 years 7 months ago
Artist As Researcher, Understanding The Tools
The paper begins with a response to the nature of contemporary artists relationships to how computers have permeated the fine art domain and how they affect the creative process. ...
Theresa Gartland-Jones
HICSS
2007
IEEE
155views Biometrics» more  HICSS 2007»
15 years 8 months ago
Does SOA Improve the Supply Chain? An Empirical Analysis of the Impact of SOA Adoption on Electronic Supply Chain Performance
Service Oriented Architecture (“SOA”) has been viewed as a strategic approach to IT that provides increased flexibility. However, there is scant research evidence of SOA adopt...
Sanjeev Kumar, Vijay Dakshinamoorthy, M. S. Krishn...