Sciweavers

775 search results - page 40 / 155
» Email data cleaning
Sort
View
IEEEARES
2010
IEEE
14 years 3 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
SIGMOD
2007
ACM
135views Database» more  SIGMOD 2007»
14 years 10 months ago
XTream: personal data streams
The real usability of data stream systems depends on the practical aspect of building applications on data streams. In this demo we show two possible applications on data streams,...
Michael Duller, Rokas Tamosevicius, Gustavo Alonso...
KDD
2001
ACM
228views Data Mining» more  KDD 2001»
14 years 10 months ago
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive indust
REVI-MINER is a KDD-environment which supports the detection and analysis of deviations in warranty and goodwill cost statements. The system was developed within the framework of ...
Edgar Hotz, Udo Grimmer, W. Heuser, Gholamreza Nak...
DEBU
2010
127views more  DEBU 2010»
13 years 7 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
VIS
2005
IEEE
150views Visualization» more  VIS 2005»
14 years 11 months ago
VolumeExplorer: Roaming Large Volumes to Couple Visualization and Data Processing for Oil and Gas Exploration
In this paper, we present a volume roaming system dedicated to oil and gas exploration. Our system combines probebased volume rendering with data processing and computing. The dai...
Laurent Castanie, Bruno Lévy, Fabien Bosque...