Sciweavers

531 search results - page 99 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
BMCBI
2010
107views more  BMCBI 2010»
14 years 11 months ago
Semantic annotation of morphological descriptions: an overall strategy
Background: Large volumes of morphological descriptions of whole organisms have been created as print or electronic text in a human-readable format. Converting the descriptions in...
Hong Cui
WCRE
2010
IEEE
14 years 10 months ago
Software Process Recovery: Recovering Process from Artifacts
—Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons in...
Abram Hindle
IAAI
2003
15 years 1 months ago
CriterionSM Online Essay Evaluation: An Application for Automated Evaluation of Student Essays
This paper describes a deployed educational technology application: the CriterionSM Online Essay Evaluation Service, a web-based system that provides automated scoring and evaluat...
Jill Burstein, Martin Chodorow, Claudia Leacock
91
Voted
CVIU
2008
229views more  CVIU 2008»
14 years 11 months ago
Estimating pedestrian counts in groups
The goal of this work is to provide a system which can aid in monitoring crowded urban environments, which often contain tight groups of people. In this paper, we consider the pro...
Prahlad Kilambi, Evan Ribnick, Ajay J. Joshi, Osam...
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
15 years 6 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...