Sciweavers

2269 search results - page 391 / 454
» Behavioral Intrusion Detection
Sort
View
CHI
2007
ACM
14 years 10 months ago
Expressing emotion in text-based communication
Our ability to express and accurately assess emotional states is central to human life. The present study examines how people express and detect emotions during text-based communi...
Jeffrey T. Hancock, Christopher Landrigan, Courtne...
CHI
2006
ACM
14 years 10 months ago
Insert movie reference here: a system to bridge conversation and item-oriented web sites
Item-oriented Web sites maintain repositories of information about things such as books, games, or products. Many of these Web sites offer discussion forums. However, these forums...
Sara Drenner, F. Maxwell Harper, Dan Frankowski, J...
RECOMB
2006
Springer
14 years 10 months ago
Structural Alignment of Pseudoknotted RNA
In this paper, we address the problem of discovering novel non-coding RNA (ncRNA) using primary sequence, and secondary structure conservation, focusing on ncRNA families with pseu...
Banu Dost, Buhm Han, Shaojie Zhang, Vineet Bafna
VLDB
2007
ACM
115views Database» more  VLDB 2007»
14 years 10 months ago
NS2: Networked Searchable Store with Correctness
In an outsourced data framework, we introduce and demonstrate mechanisms for securely storing a set of data items (documents) on an un-trusted server, while allowing for subsequen...
Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan K...
EDBT
2004
ACM
110views Database» more  EDBT 2004»
14 years 10 months ago
Using Convolution to Mine Obscure Periodic Patterns in One Pass
The mining of periodic patterns in time series databases is an interesting data mining problem that can be envisioned as a tool for forecasting and predicting the future behavior o...
Mohamed G. Elfeky, Walid G. Aref, Ahmed K. Elmagar...