Sciweavers

1096 search results - page 146 / 220
» Using Prior Knowledge: Problems and Solutions
Sort
View
113
Voted
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 3 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
ADMA
2008
Springer
122views Data Mining» more  ADMA 2008»
15 years 9 months ago
Open Domain Recommendation: Social Networks and Collaborative Filtering
Commercial enterprises employ data mining techniques to recommend products to their customers. Most of the prior research is usually focused on a specific domain such as movies or...
Sarah K. Tyler, Yi Zhang
INFOCOM
2000
IEEE
15 years 7 months ago
Prefetching the Means for Document Transfer: A New Approach for Reducing Web Latency
User-perceived latency is recognized as the central performance problem in the Web. We systematically measure factors contributing to this latency, across several locations. Our s...
Edith Cohen, Haim Kaplan
JDA
2008
87views more  JDA 2008»
15 years 3 months ago
Lossless filter for multiple repetitions with Hamming distance
Similarity search in texts, notably in biological sequences, has received substantial attention in the last few years. Numerous filtration and indexing techniques have been create...
Pierre Peterlongo, Nadia Pisanti, Fréd&eacu...
STOC
2005
ACM
156views Algorithms» more  STOC 2005»
16 years 3 months ago
Convex programming for scheduling unrelated parallel machines
We consider the classical problem of scheduling parallel unrelated machines. Each job is to be processed by exactly one machine. Processing job j on machine i requires time pij . ...
Yossi Azar, Amir Epstein