Sciweavers

2227 search results - page 405 / 446
» Evaluation Measures for TCBR Systems
Sort
View
WWW
2005
ACM
14 years 11 months ago
Three-level caching for efficient query processing in large Web search engines
Large web search engines have to answer thousands of queries per second with interactive response times. Due to the sizes of the data sets involved, often in the range of multiple...
Xiaohui Long, Torsten Suel
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 11 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
CHI
2008
ACM
14 years 11 months ago
Understanding and characterizing insights: how do people gain insights using information visualization?
Even though "providing insight" has been considered one of the main purposes of information visualization (InfoVis), we feel that insight is still a not-well-understood ...
Ji Soo Yi, Youn ah Kang, John T. Stasko, Julie A. ...
ICDM
2008
IEEE
123views Data Mining» more  ICDM 2008»
14 years 5 months ago
Discovering Flow Anomalies: A SWEET Approach
Given a percentage-threshold and readings from a pair of consecutive upstream and downstream sensors, flow anomaly discovery identifies dominant time intervals where the fractio...
James M. Kang, Shashi Shekhar, Christine Wennen, P...
ACSAC
2007
IEEE
14 years 5 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion