Sciweavers

1519 search results - page 253 / 304
» A Search Log-Based Approach to Evaluation
Sort
View
WEBDB
2001
Springer
137views Database» more  WEBDB 2001»
14 years 3 months ago
Using Database Technology to Improve Performance of Web Proxy Servers
In this paper, we propose to use database technology to improve performance of web proxy servers. We view the cache at a proxy server as a web warehouse with data organized in a h...
Kai Cheng, Yahiko Kambayashi, Mukesh K. Mohania
RAID
1999
Springer
14 years 3 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
KDD
1998
ACM
118views Data Mining» more  KDD 1998»
14 years 3 months ago
A Belief-Driven Method for Discovering Unexpected Patterns
Several pattern discovery methods proposed in the data mining literature have the drawbacks that they discover too many obvious or irrelevant patterns and that they do not leverag...
Balaji Padmanabhan, Alexander Tuzhilin
KBSE
1997
IEEE
14 years 3 months ago
NORA/HAMMR: Making Deduction-Based Software Component Retrieval Practical
Deduction-based software component retrieval uses preand postconditions as indexes and search keys and an automated theorem prover (ATP) to check whether a component matches. This...
Johann Schumann, Bernd Fischer 0002
AGENTS
1997
Springer
14 years 3 months ago
An Adaptive Web Page Recommendation Service
An adaptive recommendation service seeks to adapt to its users, providing increasingly personalized recommendations over time. In this paper we introduce the \Fab" adaptive W...
Marko Balabanovic