Sciweavers

1122 search results - page 191 / 225
» Information Retrieval in Network Administration
Sort
View

Book
640views
16 years 10 months ago
Introduction to Pattern Recognition
"Pattern recognition techniques are concerned with the theory and algorithms of putting abstract objects, e.g., measurements made on physical objects, into categories. Typical...
Sargur Srihari
NDSS
2002
IEEE
15 years 4 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
SUTC
2010
IEEE
15 years 3 months ago
Adaptive Activity Spotting Based on Event Rates
—To date many activity spotting approaches are static: once the system is trained and deployed it does not change anymore. There are substantial shortcomings of this approach, sp...
Oliver Amft
HAIS
2008
Springer
15 years 27 days ago
A WeVoS-CBR Approach to Oil Spill Problem
The hybrid intelligent system presented here, forecasts the presence or not of oil slicks in a certain area of the open sea after an oil spill using CaseBased Reasoning methodology...
Emilio Corchado, Bruno Baruque, Aitor Mata, Juan M...
SIGMOD
2008
ACM
118views Database» more  SIGMOD 2008»
14 years 11 months ago
Enriching topic-based publish-subscribe systems with related content
This demonstration presents RMFinder (Related Messages Finder), a system that retains the simplicity and efficiency of topic-based P2P pub-sub, while providing a richer service wh...
Rubi Boim, Tova Milo