Sciweavers

1356 search results - page 67 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
ICDM
2009
IEEE
151views Data Mining» more  ICDM 2009»
13 years 6 months ago
TagLearner: A P2P Classifier Learning System from Collaboratively Tagged Text Documents
The amount of text data on the Internet is growing at a very fast rate. Online text repositories for news agencies, digital libraries and other organizations currently store gigaan...
Haimonti Dutta, Xianshu Zhu, Tushar Mahule, Hillol...
GI
2009
Springer
13 years 6 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
IPSN
2004
Springer
14 years 1 months ago
Estimation from lossy sensor data: jump linear modeling and Kalman filtering
Due to constraints in cost, power, and communication, losses often arise in large sensor networks. The sensor can be modeled as an output of a linear stochastic system with random...
Alyson K. Fletcher, Sundeep Rangan, Vivek K. Goyal
ICCV
2009
IEEE
15 years 1 months ago
A Riemannian Analysis of 3D Nose Shapes For Partial Human Biometrics
In this paper we explore the use of shapes of noses for performing partial human biometrics. The basic idea is to represent nasal surfaces using indexed collections of isocurves,...
Hassen drira, Boulbaba Ben Amor, Anuj Srivastava, ...
PROCEDIA
2010
154views more  PROCEDIA 2010»
13 years 3 months ago
Parallel computation of phylogenetic consensus trees
The field of bioinformatics is witnessing a rapid and overwhelming accumulation of molecular sequence data, predominantly driven by novel wet-lab sequencing techniques. This trend...
Andre J. Aberer, Nicholas D. Pattengale, Alexandro...