Sciweavers

880 search results - page 143 / 176
» Looking at data
Sort
View
IICAI
2003
14 years 11 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
BMCBI
2006
90views more  BMCBI 2006»
14 years 9 months ago
A Fourier Transformation based Method to Mine Peptide Space for Antimicrobial Activity
Background: Naturally occurring antimicrobial peptides are currently being explored as potential candidate peptide drugs. Since antimicrobial peptides are part of the innate immun...
Vijayaraj Nagarajan, Navodit Kaushik, Beddhu Mural...
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
15 years 10 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
SIGMOD
2005
ACM
151views Database» more  SIGMOD 2005»
15 years 10 months ago
The 8 requirements of real-time stream processing
Applications that require real-time processing of high-volume data steams are pushing the limits of traditional data processing infrastructures. These stream-based applications in...
Michael Stonebraker, Ugur Çetintemel, Stanley B. ...
WSDM
2010
ACM
251views Data Mining» more  WSDM 2010»
15 years 7 months ago
Large Scale Query Log Analysis of Re-Finding
Although Web search engines are targeted towards helping people find new information, people regularly use them to re-find Web pages they have seen before. Researchers have noted ...
Jaime Teevan, Sarah K. Tyler