Sciweavers

31 search results - page 4 / 7
» Online solutions: looking to the future of knowledgeBase man...
Sort
View
104
Voted
TMA
2010
Springer
137views Management» more  TMA 2010»
14 years 7 months ago
K-Dimensional Trees for Continuous Traffic Classification
Abstract. The network measurement community has proposed multiple machine learning (ML) methods for traffic classification during the last years. Although several research works ha...
Valentín Carela-Español, Pere Barlet...
ACSAC
2001
IEEE
15 years 1 months ago
Requirements for a General Framework for Response to Distributed Denial-of-Service
What is network denial of service (DoS), and why is it such a problem? This research project has sought to investigate these questions and look at the deeper questions such as can...
D. W. Gresty, Qi Shi, Madjid Merabti
73
Voted
SIGUCCS
2000
ACM
15 years 1 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
EOR
2007
96views more  EOR 2007»
14 years 9 months ago
A fast method for discovering critical edge sequences in e-commerce catalogs
Web sites allow the collection of vast amounts of navigational data – clickstreams of user traversals through the site. These massive data stores offer the tantalizing possibil...
Kaushik Dutta, Debra E. VanderMeer, Anindya Datta,...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin