Sciweavers

409 search results - page 66 / 82
» Review spam detection
Sort
View
ICDE
2009
IEEE
251views Database» more  ICDE 2009»
16 years 1 months ago
Contextual Ranking of Keywords Using Click Data
The problem of automatically extracting the most interesting and relevant keyword phrases in a document has been studied extensively as it is crucial for a number of applications. ...
Utku Irmak, Vadim von Brzeski, Reiner Kraft
GI
2009
Springer
14 years 9 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
RAID
1999
Springer
15 years 4 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
BMCBI
2008
195views more  BMCBI 2008»
14 years 12 months ago
Goldsurfer2 (Gs2): A comprehensive tool for the analysis and visualization of genome wide association studies
Background: Genome wide association (GWA) studies are now being widely undertaken aiming to find the link between genetic variations and common diseases. Ideally, a well-powered G...
Fredrik Pettersson, Andrew P. Morris, Michael R. B...
CANDC
2008
ACM
14 years 12 months ago
'Genome order index' should not be used for defining compositional constraints in nucleotide sequences
Background: The Z-curve is a three dimensional representation of DNA sequences proposed over a decade ago and has been extensively applied to sequence segmentation, horizontal gen...
Eran Elhaik, Dan Graur, Kresimir Josic