Sciweavers

11588 search results - page 209 / 2318
» Will They Like This
Sort
View
104
Voted
DAWAK
2009
Springer
15 years 4 months ago
TidFP: Mining Frequent Patterns in Different Databases with Transaction ID
Since transaction identifiers (ids) are unique and would not usually be frequent, mining frequent patterns with transaction ids, showing records they occurred in, provides an effic...
C. I. Ezeife, Dan Zhang
121
Voted
GLOBECOM
2009
IEEE
15 years 4 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
AINA
2004
IEEE
15 years 4 months ago
Performance Improvement for GPRS, WLAN Integration using Ad Hoc Networks
As the wireless technology evolves, one can access the Internet almost everywhere via many wireless access networks such as wireless LAN and GPRS. People would like to use the wir...
Jui-Ming Chen, Li-Der Chou
86
Voted
AMAST
2006
Springer
15 years 4 months ago
Formal Islands
Abstract. Motivated by the proliferation and usefulness of Domain Specific Languages as well as the demand in enriching well established languages by high level capabilities like p...
Emilie Balland, Claude Kirchner, Pierre-Etienne Mo...
CINQ
2004
Springer
151views Database» more  CINQ 2004»
15 years 4 months ago
Query Languages Supporting Descriptive Rule Mining: A Comparative Study
Recently, inductive databases (IDBs) have been proposed to tackle the problem of knowledge discovery from huge databases. With an IDB, the user/analyst performs a set of very diffe...
Marco Botta, Jean-François Boulicaut, Cyril...