Sciweavers

772 search results - page 118 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
CORR
2004
Springer
208views Education» more  CORR 2004»
14 years 11 months ago
Business Intelligence from Web Usage Mining
The rapid e-commerce growth has made both business community and customers face a new situation. Due to intense competition on the one hand and the customer's option to choose...
Ajith Abraham
CIKM
2010
Springer
14 years 10 months ago
Building recommendation systems using peer-to-peer shared content
Peer-to-Peer (p2p) networks are used for sharing content by millions of users. Often, meta-data used for searching is missing or wrong, making it difficult for users to find cont...
Yuval Shavitt, Ela Weinsberg, Udi Weinsberg
CLUSTER
2001
IEEE
15 years 3 months ago
GulfStream - a System for Dynamic Topology Management in Multi-domain Server Farms
This paper describes GulfStream, a scalable distributed software system designed to address the problem of managing the network topology in a multi-domain server farm. In particul...
Sameh A. Fakhouri, Germán S. Goldszmidt, Mi...
RAID
2010
Springer
14 years 10 months ago
On Challenges in Evaluating Malware Clustering
Malware clustering and classification are important tools that enable analysts to prioritize their malware analysis efforts. The recent emergence of fully automated methods for ma...
Peng Li, Limin Liu, Debin Gao, Michael K. Reiter
BIBM
2009
IEEE
172views Bioinformatics» more  BIBM 2009»
15 years 4 months ago
Identifying Gene Signatures from Cancer Progression Data Using Ordinal Analysis
—A comprehensive understanding of cancer progression may shed light on genetic and molecular mechanisms of oncogenesis, and it may provide much needed information for effective d...
Yoon Soo Pyon, Jing Li