Sciweavers

1356 search results - page 66 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
KDD
2008
ACM
120views Data Mining» more  KDD 2008»
14 years 8 months ago
Entity categorization over large document collections
Extracting entities (such as people, movies) from documents and identifying the categories (such as painter, writer) they belong to enable structured querying and data analysis ov...
Arnd Christian König, Rares Vernica, Venkates...
TKDE
2012
270views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Low-Rank Kernel Matrix Factorization for Large-Scale Evolutionary Clustering
—Traditional clustering techniques are inapplicable to problems where the relationships between data points evolve over time. Not only is it important for the clustering algorith...
Lijun Wang, Manjeet Rege, Ming Dong, Yongsheng Din...
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
14 years 9 days ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
CG
2008
Springer
13 years 8 months ago
Practical global illumination for interactive particle visualization
Particle-based simulation methods are used to model a wide range of complex phenomena and to solve time-dependent problems of various scales. Effective visualizations of the resul...
Christiaan P. Gribble, Carson Brownlee, Steven G. ...
NAR
2000
120views more  NAR 2000»
13 years 8 months ago
WIT: integrated system for high-throughput genome sequence analysis and metabolic reconstruction
The WIT (What Is There) (http://wit.mcs.anl.gov/WIT2/ ) system has been designed to support comparative analysis of sequenced genomes and to generate metabolic reconstructions bas...
Ross A. Overbeek, Niels Larsen, Gordon D. Pusch, M...