Sciweavers

558 search results - page 7 / 112
» Safe and Effective Determinant Evaluation
Sort
View
92
Voted
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 10 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
CIARP
2005
Springer
15 years 3 months ago
Development and Validation of an Algorithm for Cardiomyocyte Beating Frequency Determination
The Chagas disease or Tripanosomiasis Americana affects between 16 and 18 million people in endemic areas. This disease affects the beating rate of infected patients’ cardiomyocy...
Demian Wassermann, Marta Mejail
DMIN
2006
131views Data Mining» more  DMIN 2006»
14 years 11 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar
SECON
2008
IEEE
15 years 3 months ago
Content Distribution in VANETs Using Network Coding: The Effect of Disk I/O and Processing O/H
Abstract—Besides safe navigation (e.g., warning of approaching vehicles), car to car communications will enable a host of new applications, ranging from office-on-the-wheel supp...
Seung-Hoon Lee, Uichin Lee, Kang-Won Lee, Mario Ge...
ICDE
2012
IEEE
203views Database» more  ICDE 2012»
12 years 12 months ago
Parameter-Free Determination of Distance Thresholds for Metric Distance Constraints
—The importance of introducing distance constraints to data dependencies, such as differential dependencies (DDs) [28], has recently been recognized. The metric distance constrai...
Shaoxu Song, Lei Chen 0002, Hong Cheng