Sciweavers

645 search results - page 103 / 129
» Pure patterns type systems
Sort
View
BNCOD
2003
127views Database» more  BNCOD 2003»
15 years 3 months ago
Performance Evaluation and Analysis of K-Way Join Variants for Association Rule Mining
Data mining aims at discovering important and previously unknown patterns from the dataset in the underlying database. Database mining performs mining directly on data stored in r...
P. Mishra, Sharma Chakravarthy
VIROLOGY
2010
162views more  VIROLOGY 2010»
15 years 9 days ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
EMNLP
2010
14 years 12 months ago
Automatically Producing Plot Unit Representations for Narrative Text
In the 1980s, plot units were proposed as a conceptual knowledge structure for representing and summarizing narrative stories. Our research explores whether current NLP technology...
Amit Goyal, Ellen Riloff, Hal Daumé III
SYSTOR
2009
ACM
15 years 8 months ago
DHIS: discriminating hierarchical storage
A typical storage hierarchy comprises of components with varying performance and cost characteristics, providing multiple options for data placement. We propose and evaluate a hie...
Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Z...
JAIR
2010
181views more  JAIR 2010»
14 years 8 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton