Sciweavers

543 search results - page 103 / 109
» Exploiting content redundancy for web information extraction
Sort
View
PC
2002
189views Management» more  PC 2002»
13 years 7 months ago
Data management and transfer in high-performance computational grid environments
An emerging class of data-intensive applications involve the geographically dispersed extraction of complex scientific information from very large collections of measured or compu...
William E. Allcock, Joseph Bester, John Bresnahan,...
MMM
2009
Springer
180views Multimedia» more  MMM 2009»
14 years 4 months ago
Personalized News Video Recommendation
In this paper, a novel framework is developed to support personalized news video recommendation. First, multi-modal information sources for news videos are seamlessly integrated an...
Hangzai Luo, Jianping Fan, Daniel A. Keim, Shin'ic...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 8 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
BMCBI
2004
119views more  BMCBI 2004»
13 years 7 months ago
Genome SEGE: A database for 'intronless' genes in eukaryotic genomes
Background: A number of completely sequenced eukaryotic genome data are available in the public domain. Eukaryotic genes are either 'intron containing' or 'intronle...
Meena K. Sakharkar, Pandjassarame Kangueane
IEEECIT
2010
IEEE
13 years 6 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi