Sciweavers

120 search results - page 17 / 24
» Fast Multipattern Search Algorithms for Intrusion Detection
Sort
View
PAKDD
2004
ACM
94views Data Mining» more  PAKDD 2004»
14 years 25 days ago
Self-Similar Mining of Time Association Rules
Although the task of mining association rules has received considerable attention in the literature, algorithms to find time association rules are often inadequate, by either miss...
Daniel Barbará, Ping Chen, Zohreh Nazeri
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
14 years 7 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
JCP
2008
171views more  JCP 2008»
13 years 7 months ago
Mining Frequent Subgraph by Incidence Matrix Normalization
Existing frequent subgraph mining algorithms can operate efficiently on graphs that are sparse, have vertices with low and bounded degrees, and contain welllabeled vertices and edg...
Jia Wu, Ling Chen
MM
2009
ACM
198views Multimedia» more  MM 2009»
14 years 5 days ago
Scalable detection of partial near-duplicate videos by visual-temporal consistency
Following the exponential growth of social media, there now exist huge repositories of videos online. Among the huge volumes of videos, there exist large numbers of near-duplicate...
Hung-Khoon Tan, Chong-Wah Ngo, Richang Hong, Tat-S...
SIGCSE
2006
ACM
127views Education» more  SIGCSE 2006»
14 years 1 months ago
SNITCH: a software tool for detecting cut and paste plagiarism
Plagiarism of material from the Internet is a widespread and growing problem. Computer science students, and those in other science and engineering courses, can sometimes get away...
Sebastian Niezgoda, Thomas P. Way