Sciweavers

502 search results - page 80 / 101
» A Framework for Activity Recognition and Detection of Unusua...
Sort
View
KDD
2006
ACM
180views Data Mining» more  KDD 2006»
14 years 9 months ago
Learning the unified kernel machines for classification
Kernel machines have been shown as the state-of-the-art learning techniques for classification. In this paper, we propose a novel general framework of learning the Unified Kernel ...
Steven C. H. Hoi, Michael R. Lyu, Edward Y. Chang
IPM
2011
118views more  IPM 2011»
13 years 3 months ago
Detecting spam blogs from blog search results
Blogging has been an emerging media for people to express themselves. However, the presence of spam-blogs (also known as splogs) may reduce the value of blogs and blog search engi...
Linhong Zhu, Aixin Sun, Byron Choi
ACMSE
2006
ACM
13 years 10 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
BMCBI
2010
129views more  BMCBI 2010»
13 years 8 months ago
Detection of distant evolutionary relationships between protein families using theory of sequence profile-profile comparison
Background: Detection of common evolutionary origin (homology) is a primary means of inferring protein structure and function. At present, comparison of protein families represent...
Mindaugas Margelevicius, Ceslovas Venclovas
CIT
2004
Springer
14 years 2 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem