Sciweavers

546 search results - page 96 / 110
» Using and Detecting Links in Wikipedia
Sort
View
69
Voted
SIGCOMM
2003
ACM
15 years 2 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
100
Voted
DEXA
2006
Springer
197views Database» more  DEXA 2006»
14 years 11 months ago
Cleaning Web Pages for Effective Web Content Mining
Classifying and mining noise-free web pages will improve on accuracy of search results as well as search speed, and may benefit webpage organization applications (e.g., keyword-bas...
Jing Li, Christie I. Ezeife
AMC
2008
111views more  AMC 2008»
14 years 9 months ago
Chemical agent detector placement methodology
Terrorism is a threat to global peace in our world today and in the future this terrorist threat is surely going to be important. Global terrorist groups have highly sophisticated...
Cevriye Gencer, Emel Kizilkaya Aydogan, Abdullah S...
BMCBI
2011
14 years 4 months ago
CNV-WebStore: Online CNV Analysis, Storage and Interpretation
Background: Microarray technology allows the analysis of genomic aberrations at an ever increasing resolution, making functional interpretation of these vast amounts of data the m...
Geert Vandeweyer, Edwin Reyniers, Wim Wuyts, Liesb...
ICDE
2005
IEEE
122views Database» more  ICDE 2005»
15 years 10 months ago
Uncovering Database Access Optimizations in the Middle Tier with TORPEDO
A popular architecture for enterprise applications is one of a stateless object-based server accessing persistent data through Object-Relational mapping software. The reported ben...
Bruce E. Martin