Sciweavers

476 search results - page 34 / 96
» Analysis of signature change patterns
Sort
View
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
14 years 4 months ago
Temporal Analysis of Semantic Graphs Using ASALSAN
ASALSAN is a new algorithm for computing three-way DEDICOM, which is a linear algebra model for analyzing intrinsically asymmetric relationships, such as trade among nations or th...
Brett W. Bader, Richard A. Harshman, Tamara G. Kol...
IMSCCS
2007
IEEE
14 years 4 months ago
TOPSAW Sawing Optimization Analysis Using Grid Computing
TOPSAW program was developed by Dr. S. Chang and his team and has been successfully used in the replication of sawmill cutting to determine the optimal cutting pattern for a log t...
Ashwin Bommathanahalli, Maoyuan Xie, Zhifeng Yun, ...
IVS
2008
79views more  IVS 2008»
13 years 10 months ago
Scalable and interactive visual analysis of financial wire transactions for fraud detection
Large financial institutions such as Bank of America handle hundreds of thousands of wire transactions per day. Although most transactions are legitimate, these institutions have ...
Remco Chang, Alvin Lee, Mohammad Ghoniem, Robert K...
GIS
1998
ACM
13 years 10 months ago
Aoristic Crime Analysis
Abstract. Crime pattern analysis has tended to focus on `hotspot’ analysis techniques; the identi® cation of areas with higher densities of criminal activity. This paper documen...
Jerry H. Ratcliffe, Michael J. McCullagh
USENIX
2008
14 years 22 days ago
Measurement and Analysis of Large-Scale Network File System Workloads
In this paper we present the analysis of two large-scale network file system workloads. We measured CIFS traffic for two enterprise-class file servers deployed in the NetApp data ...
Andrew W. Leung, Shankar Pasupathy, Garth R. Goods...