Sciweavers

512 search results - page 72 / 103
» Explorative Data Mining on Stock Data - Experimental Results...
Sort
View
DASC
2006
IEEE
14 years 2 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
MM
2004
ACM
173views Multimedia» more  MM 2004»
14 years 2 months ago
Cortina: a system for large-scale, content-based web image retrieval
Recent advances in processing and networking capabilities of computers have led to an accumulation of immense amounts of multimedia data such as images. One of the largest reposit...
Till Quack, Ullrich Mönich, Lars Thiele, B. S...
WWW
2005
ACM
14 years 9 months ago
Duplicate detection in click streams
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
IS
2008
13 years 8 months ago
Continuous subspace clustering in streaming time series
Performing data mining tasks in streaming data is considered a challenging research direction, due to the continuous data evolution. In this work, we focus on the problem of clust...
Maria Kontaki, Apostolos N. Papadopoulos, Yannis M...
PREMI
2005
Springer
14 years 2 months ago
Systematically Evolving Configuration Parameters for Computational Intelligence Methods
The configuration of a computational intelligence (CI) method is responsible for its intelligence (e.g. tolerance, flexibility) as well as its accuracy. In this paper, we investiga...
Jason M. Proctor, Rosina Weber