Sciweavers

1875 search results - page 343 / 375
» Automatic Network Protocol Analysis
Sort
View
ICMLA
2007
13 years 10 months ago
Soft Failure Detection Using Factorial Hidden Markov Models
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an of...
Guillaume Bouchard, Jean-Marc Andreoli
ECSCW
2003
13 years 10 months ago
Discovery of Implicit and Explicit Connections Between People Using Email Utterance
This paper is about finding explicit and implicit connections between people by mining semantic associations from their email communications. Following from a sociocognitive stance...
Robert McArthur, Peter Bruza
SPIN
2001
Springer
14 years 1 months ago
From Model Checking to a Temporal Proof
ions Using SPIN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Marsha Chechik, Benet Devereux, Arie Gurfinkel (University of Toronto) Imp...
Doron Peled, Lenore D. Zuck
TKDE
2008
125views more  TKDE 2008»
13 years 8 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
MMM
2009
Springer
169views Multimedia» more  MMM 2009»
14 years 5 months ago
Personalized Image Recommendation
—In this paper, we have developed a novel framework called JustClick to enable personalized image recommendation via exploratory search from large-scale collections of manuallyan...
Yuli Gao, Hangzai Luo, Jianping Fan