Sciweavers

796 search results - page 118 / 160
» Effective Use of the KDD Process and Data Mining for Compute...
Sort
View
ICDCS
2012
IEEE
11 years 11 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
SDM
2011
SIAM
269views Data Mining» more  SDM 2011»
12 years 11 months ago
Semi-Supervised Convolution Graph Kernels for Relation Extraction
Extracting semantic relations between entities is an important step towards automatic text understanding. In this paper, we propose a novel Semi-supervised Convolution Graph Kerne...
Xia Ning, Yanjun Qi
CLEANDB
2006
ACM
312views Database» more  CLEANDB 2006»
14 years 22 days ago
Efficiently Filtering RFID Data Streams
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing ...
Yijian Bai, Fusheng Wang, Peiya Liu
CCGRID
2011
IEEE
13 years 24 days ago
A Segment-Level Adaptive Data Layout Scheme for Improved Load Balance in Parallel File Systems
Abstract—Parallel file systems are designed to mask the everincreasing gap between CPU and disk speeds via parallel I/O processing. While they have become an indispensable compo...
Huaiming Song, Yanlong Yin, Xian-He Sun, Rajeev Th...
EIT
2008
IEEE
13 years 10 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno