Sciweavers

1595 search results - page 298 / 319
» A hierarchical clustering algorithm based on the Hungarian m...
Sort
View
TREC
2003
13 years 11 months ago
UMBC at TREC 12
Abstract. We present the results of UMBC’s participation in the Web and Novelty tracks. We explored various heuristics-based link analysis approaches to the Topic Distillation ta...
Srikanth Kallurkar, Yongmei Shi, R. Scott Cost, Ch...
IJDSN
2006
136views more  IJDSN 2006»
13 years 10 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
JCDL
2011
ACM
374views Education» more  JCDL 2011»
13 years 1 months ago
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Bela Gipp, Norman Meuschke, Jöran Beel
BMCBI
2007
86views more  BMCBI 2007»
13 years 10 months ago
Tandem mass spectrometry data quality assessment by self-convolution
Background: Many algorithms have been developed for deciphering the tandem mass spectrometry (MS) data sets. They can be essentially clustered into two classes. The first performs...
Keng Wah Choo, Wai Mun Tham
JAIR
2010
181views more  JAIR 2010»
13 years 5 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton