Sciweavers

10458 search results - page 1741 / 2092
» Modeling Features at Runtime
Sort
View
155
Voted
KBSE
2005
IEEE
15 years 9 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
105
Voted
JCDL
2005
ACM
100views Education» more  JCDL 2005»
15 years 9 months ago
Automatic extraction of titles from general documents using machine learning
In this paper, we propose a machine learning approach to title extraction from general documents. By general documents, we mean documents that can belong to any one of a number of...
Yunhua Hu, Hang Li, Yunbo Cao, Dmitriy Meyerzon, Q...
161
Voted
SIGIR
2004
ACM
15 years 9 months ago
A search engine for historical manuscript images
Many museum and library archives are digitizing their large collections of handwritten historical manuscripts to enable public access to them. These collections are only available...
Toni M. Rath, R. Manmatha, Victor Lavrenko
131
Voted
KDD
2004
ACM
285views Data Mining» more  KDD 2004»
15 years 9 months ago
Effective localized regression for damage detection in large complex mechanical structures
In this paper, we propose a novel data mining technique for the efficient damage detection within the large-scale complex mechanical structures. Every mechanical structure is defi...
Aleksandar Lazarevic, Ramdev Kanapady, Chandrika K...
165
Voted
HOTOS
2003
IEEE
15 years 9 months ago
Towards a Semantic-Aware File Store
—Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage systems. In this paper, we discuss the principles o...
Zhichen Xu, Magnus Karlsson, Chunqiang Tang, Chris...
« Prev « First page 1741 / 2092 Last » Next »