Sciweavers

1356 search results - page 238 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
SDM
2010
SIAM
283views Data Mining» more  SDM 2010»
13 years 9 months ago
Cascading Spatio-temporal Pattern Discovery: A Summary of Results
Given a collection of Boolean spatio-temporal(ST) event types, the cascading spatio-temporal pattern (CSTP) discovery process finds partially ordered subsets of event-types whose ...
Pradeep Mohan, Shashi Shekhar, James A. Shine, Jam...
EJWCN
2010
118views more  EJWCN 2010»
13 years 2 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
BMCBI
2006
129views more  BMCBI 2006»
13 years 8 months ago
A literature-based similarity metric for biological processes
Background: Recent analyses in systems biology pursue the discovery of functional modules within the cell. Recognition of such modules requires the integrative analysis of genome-...
Monica Chagoyen, Pedro Carmona-Saez, Concha Gil, J...
VIS
2009
IEEE
399views Visualization» more  VIS 2009»
14 years 9 months ago
Visual Human+Machine Learning
In this paper we describe a novel method to integrate interactive visual analysis and machine learning to support the insight generation of the user. The suggested approach combine...
Raphael Fuchs, Jürgen Waser, Meister Eduard GrÃ...
SIGMETRICS
2012
ACM
257views Hardware» more  SIGMETRICS 2012»
11 years 10 months ago
Fair sampling across network flow measurements
Sampling is crucial for controlling resource consumption by internet traffic flow measurements. Routers use Packet Sampled NetFlow [9], and completed flow records are sampled in...
Nick G. Duffield