Sciweavers

587 search results - page 48 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
92
Voted
CIKM
1999
Springer
15 years 6 months ago
A Method of Geographical Name Extraction from Japanese Text for Thematic Geographical Search
A text retrieval method called the thematic geographical search method has been developed and applied to a Japanese encyclopedia called the World Encyclopædia. In this method, th...
Yasusi Kanada
ANCS
2006
ACM
15 years 8 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 5 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
108
Voted
CHI
2010
ACM
15 years 9 months ago
Characterizing debate performance via aggregated twitter sentiment
Television broadcasters are beginning to combine social micro-blogging systems such as Twitter with television to create social video experiences around events. We looked at one s...
Nicholas Diakopoulos, David A. Shamma
SIGIR
2008
ACM
15 years 2 months ago
On document splitting in passage detection
Passages can be hidden within a text to circumvent their disallowed transfer. Such release of compartmentalized information is of concern to all corporate and governmental organiz...
Nazli Goharian, Saket S. R. Mengle