Sciweavers

92 search results - page 17 / 19
» Relating Expectations to Automatically Recovered Design Patt...
Sort
View
117
Voted
ACSAC
2008
IEEE
15 years 7 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
106
Voted
ICDT
2010
ACM
219views Database» more  ICDT 2010»
15 years 10 months ago
Aggregate Queries for Discrete and Continuous Probabilistic XML
Sources of data uncertainty and imprecision are numerous. A way to handle this uncertainty is to associate probabilistic annotations to data. Many such probabilistic database mode...
Serge Abiteboul, T.-H Hubert Chan, Evgeny Kharlamo...
106
Voted
ICSE
2000
IEEE-ACM
15 years 4 months ago
Software needs engineering: a position paper
When the general press refers to `software' in its headlines, then this is often not to relate a success story, but to expand on yet another `software-risk-turned-problem-sto...
Jane Grimson, Hans-Jürgen Kugler
147
Voted
BMCBI
2008
134views more  BMCBI 2008»
15 years 1 months ago
Identification of transcription factor contexts in literature using machine learning approaches
Background: Availability of information about transcription factors (TFs) is crucial for genome biology, as TFs play a central role in the regulation of gene expression. While man...
Hui Yang, Goran Nenadic, John A. Keane
165
Voted
KDD
2012
ACM
190views Data Mining» more  KDD 2012»
13 years 3 months ago
Multi-label hypothesis reuse
Multi-label learning arises in many real-world tasks where an object is naturally associated with multiple concepts. It is well-accepted that, in order to achieve a good performan...
Sheng-Jun Huang, Yang Yu, Zhi-Hua Zhou