Sciweavers

733 search results - page 61 / 147
» Recommending random walks
Sort
View
AINA
2008
IEEE
14 years 12 months ago
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed t...
Jianhua Yang, Byong Lee, Stephen S. H. Huang
TAL
2010
Springer
14 years 7 months ago
Semi-automatic Endogenous Enrichment of Collaboratively Constructed Lexical Resources: Piggybacking onto Wiktionary
The lack of large-scale, freely available and durable lexical resources, and the consequences for NLP, is widely acknowledged but the attempts to cope with usual bottlenecks preven...
Franck Sajous, Emmanuel Navarro, Bruno Gaume, Laur...
ICASSP
2011
IEEE
14 years 1 months ago
Fast network querying algorithm for searching large-scale biological networks
Network querying aims to search a large network for subnetwork regions that are similar to a given query network. In this paper, we propose a novel algorithm for querying large sc...
Sayed Mohammad Ebrahim Sahraeian, Byung-Jun Yoon
AUSDM
2007
Springer
107views Data Mining» more  AUSDM 2007»
15 years 4 months ago
Preference Networks: Probabilistic Models for Recommendation Systems
Recommender systems are important to help users select relevant and personalised information over massive amounts of data available. We propose an unified framework called Prefer...
Tran The Truyen, Dinh Q. Phung, Svetha Venkatesh
ICIP
2003
IEEE
15 years 11 months ago
Random access using isolated regions
Random access is a desirable feature in many video communication systems. Intra pictures have been conventionally used as random access points, but correct picture content can als...
Miska M. Hannuksela, Ye-Kui Wang, Moncef Gabbouj