Sciweavers

410 search results - page 77 / 82
» expert 2010
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 2 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
PERCOM
2010
ACM
15 years 2 months ago
Tuning to your position: FM radio based indoor localization with spontaneous recalibration
—Position of mobile users has become highly important information in pervasive computing environments. Indoor localization systems based on Wi-Fi signal strength fingerprinting t...
Aleksandar Matic, Andrei Papliatseyeu, Venet Osman...
SIGIR
2010
ACM
15 years 1 months ago
Entity information management in complex networks
Entity information management (EIM) is a nascent IR research area that investigates the information management process about entities instead of documents. It is motivated by the ...
Yi Fang
VDA
2010
206views Visualization» more  VDA 2010»
15 years 16 days ago
Visual discovery in multivariate binary data
This paper presents the concept of Monotone Boolean Function Visual Analytics (MBFVA) and its application to the medical domain. The medical application is concerned with discover...
Boris Kovalerchuk, Florian Delizy, Logan Riggs, Ev...
VDA
2010
186views Visualization» more  VDA 2010»
15 years 16 days ago
Tile-based parallel coordinates and its application in financial visualization
Parallel coordinates technique has been widely used in information visualization applications and it has achieved great success in visualizing multivariate data and perceiving the...
Jamal Alsakran, Ye Zhao, Xinlei Zhao