Sciweavers

3785 search results - page 720 / 757
» Immune System Based Intrusion Detection System
Sort
View
WISE
2010
Springer
14 years 9 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
DEBU
2010
152views more  DEBU 2010»
14 years 9 months ago
Implementing an Append-Only Interface for Semiconductor Storage
Solid-state disks are currently based on NAND flash and expose a standard disk interface. To accommodate limitations of the medium, solid-state disk implementations avoid rewritin...
Colin W. Reid, Philip A. Bernstein
MICRO
2010
IEEE
202views Hardware» more  MICRO 2010»
14 years 6 months ago
Hardware Support for Relaxed Concurrency Control in Transactional Memory
Today's transactional memory systems implement the two-phase-locking (2PL) algorithm which aborts transactions every time a conflict happens. 2PL is a simple algorithm that pr...
Utku Aydonat, Tarek S. Abdelrahman
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 6 days ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
95
Voted
KDD
2008
ACM
213views Data Mining» more  KDD 2008»
16 years 6 days ago
Heterogeneous data fusion for alzheimer's disease study
Effective diagnosis of Alzheimer's disease (AD) is of primary importance in biomedical research. Recent studies have demonstrated that neuroimaging parameters are sensitive a...
Jieping Ye, Kewei Chen, Teresa Wu, Jing Li, Zheng ...