Sciweavers

997 search results - page 199 / 200
» Quality process and Knowledge Management Issues for the Univ...
Sort
View
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
13 years 11 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
KDD
2007
ACM
153views Data Mining» more  KDD 2007»
14 years 6 months ago
Exploiting duality in summarization with deterministic guarantees
Summarization is an important task in data mining. A major challenge over the past years has been the efficient construction of fixed-space synopses that provide a deterministic q...
Panagiotis Karras, Dimitris Sacharidis, Nikos Mamo...
RAID
2004
Springer
13 years 11 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
GIS
2005
ACM
14 years 7 months ago
Towards topological consistency and similarity of multiresolution geographical maps
Several application contexts require the ability to use together and compare different geographic datasets (maps) concerning the same or overlapping areas. This is for example the...
Alberto Belussi, Barbara Catania, Paola Podest&agr...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 6 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani