Sciweavers

1759 search results - page 112 / 352
» Using term informativeness for named entity detection
Sort
View
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
40
Voted
ICC
2007
IEEE
15 years 4 months ago
A Proposal of Finger Identification Scheme Employing Intra-Body Communications
—The Intra-Body Communication method attracted more attention since the development of ubiquitous communication. IBC is the technology to use the human body as communication tran...
Nao Kobayashi, Jordi Agud Ruiz, Shigeru Shimamoto
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
15 years 10 months ago
Approximately detecting duplicates for streaming data using stable bloom filters
Traditional duplicate elimination techniques are not applicable to many data stream applications. In general, precisely eliminating duplicates in an unbounded data stream is not f...
Fan Deng, Davood Rafiei
CHI
2010
ACM
15 years 4 months ago
Detecting professional versus personal closeness using an enterprise social network site
In this work we analyze the behavior on a company-internal social network site to determine which interaction patterns signal closeness between colleagues. Regression analysis sug...
Anna Wu, Joan Morris DiMicco, David R. Millen
WWW
2009
ACM
15 years 10 months ago
Towards lightweight and efficient DDOS attacks detection for web server
In this poster, based on our previous work in building a lightweight DDoS (Distributed Denial-of-Services) attacks detection mechanism for web server using TCM-KNN (Transductive C...
Li Guo, Qin-Wu Nie, Tianbo Lu, Yang Li, Zhihong Ti...