Sciweavers

8468 search results - page 1400 / 1694
» The Technology of Data Stashing
Sort
View
IMC
2005
ACM
15 years 4 months ago
Combining Filtering and Statistical Methods for Anomaly Detection
In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that...
Augustin Soule, Kavé Salamatian, Nina Taft
JCDL
2005
ACM
84views Education» more  JCDL 2005»
15 years 4 months ago
Finding a catalog: generating analytical catalog records from well-structured digital texts
One of the criticisms library users often make of catalogs is that they rarely include information below the bibliographic level. It is generally impossible to search a catalog fo...
David M. Mimno, Alison Jones, Gregory Crane
KCAP
2005
ACM
15 years 4 months ago
An Approach to Ontology Mapping Negotiation
Ontology mapping negotiation aims to achieve consensus among real-world entities about the process of transforming information between different models (ontologies). This paper de...
Nuno Silva, Paulo Maio, João Rocha
MM
2005
ACM
98views Multimedia» more  MM 2005»
15 years 4 months ago
Personal media sharing and authoring on the web
In this paper, we propose a novel system working on the Web for personal media sharing and authoring. Three primary technologies enable this end-to-end system, including scalable ...
Xian-Sheng Hua, Shipeng Li
SACMAT
2005
ACM
15 years 4 months ago
Role mining with ORCA
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
Jürgen Schlegelmilch, Ulrike Steffens
« Prev « First page 1400 / 1694 Last » Next »