Sciweavers

1001 search results - page 138 / 201
» An Automatic System for Collecting Crime Information on the ...
Sort
View
IDTRUST
2009
ACM
14 years 3 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
WWW
2007
ACM
14 years 9 months ago
A novel clustering-based RSS aggregator
In recent years, different commercial Weblog subscribing systems have been proposed to return stories from users' subscribed feeds. In this paper, we propose a novel clusteri...
Xin Li, Jun Yan, Zhi-Hong Deng, Lei Ji, Weiguo Fan...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
14 years 3 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
DEEC
2007
IEEE
14 years 3 months ago
DeepBot: a focused crawler for accessing hidden web content
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is "hidden" behind the query forms of onli...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...
IEAAIE
2005
Springer
14 years 2 months ago
AI/NLP Technologies Applied to Spacecraft Mission Design
In this paper we propose the model of a prototypical NLP architecture of an information access system to support a team of experts in a scientific design task, in a shared and hete...
Maria Teresa Pazienza, Marco Pennacchiotti, Michel...