Sciweavers

4466 search results - page 641 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
139
Voted
ICITA
2005
IEEE
15 years 9 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
ISMIS
2005
Springer
15 years 9 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
WABI
2001
Springer
162views Bioinformatics» more  WABI 2001»
15 years 8 months ago
A Simple Hyper-Geometric Approach for Discovering Putative Transcription Factor Binding Sites
A central issue in molecular biology is understanding the regulatory mechanisms that control gene expression. The recent flood of genomic and postgenomic data opens the way for co...
Yoseph Barash, Gill Bejerano, Nir Friedman
WSC
1997
15 years 5 months ago
Applications of the Universal Joint Task List to Joint Exercise Results
The foundation of readiness is training. The Chairman, Joint Chiefs of Staff (CJCS) Joint Training Program institutes methods for identifying training requirements through review ...
Sam H. Parry, Michael C. McAneny, Richard J. Drome...
CIKM
2005
Springer
15 years 5 months ago
Fast on-line index construction by geometric partitioning
Inverted index structures are the mainstay of modern text retrieval systems. They can be constructed quickly using off-line mergebased methods, and provide efficient support for ...
Nicholas Lester, Alistair Moffat, Justin Zobel