Sciweavers

1699 search results - page 262 / 340
» A Rule Format for Associativity
Sort
View
JOCN
2010
86views more  JOCN 2010»
15 years 2 months ago
Neural Basis of Repetition Priming during Mathematical Cognition: Repetition Suppression or Repetition Enhancement?
■ We investigated the neural basis of repetition priming (RP) during mathematical cognition. Previous studies of RP have focused on repetition suppression as the basis of behavi...
Valorie N. Salimpoor, Catie Chang, Vinod Menon
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 4 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
155
Voted
KDD
2004
ACM
171views Data Mining» more  KDD 2004»
16 years 4 months ago
Integrating Web Conceptual Modeling and Web Usage Mining
We present a case study about the application of the inductive database approach to the analysis of Web logs. We consider rich XML Web logs ? called conceptual logs ? that are gen...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Robe...
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
16 years 4 months ago
Mining from open answers in questionnaire data
Surveys are an important part of marketing and customer relationship management, and open answers (i.e., answers to open questions) in particular may contain valuable information ...
Hang Li, Kenji Yamanishi
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 10 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao