Sciweavers

197 search results - page 34 / 40
» A Model for Ranking Entities and Its Application to Wikipedi...
Sort
View
KAIS
2007
120views more  KAIS 2007»
13 years 7 months ago
Capabilities of outlier detection schemes in large datasets, framework and methodologies
Abstract. Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some importa...
Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David W...
CIA
2004
Springer
14 years 28 days ago
On the Impact of Agent Communication Languages on the Implementation of Agent Systems
Abstract. Today’s software platforms that support the construction of agent systems in accordance with the FIPA specifications essentially provide enabling infrastructure servic...
Juan Manuel Serrano, Sascha Ossowski
ISI
2004
Springer
14 years 27 days ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
CORR
2007
Springer
127views Education» more  CORR 2007»
13 years 7 months ago
Attribute Exploration of Discrete Temporal Transitions
Discrete temporal transitions occur in a variety of domains, but this work is mainly motivated by applications in molecular biology: explaining and analyzing observed transcriptome...
Johannes Wollbold
JCP
2006
173views more  JCP 2006»
13 years 7 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar