Sciweavers

32 search results - page 4 / 7
» Global Detection of Complex Copying Relationships Between So...
Sort
View
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
14 years 3 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
SIGIR
2009
ACM
14 years 3 months ago
Addressing morphological variation in alphabetic languages
The selection of indexing terms for representing documents is a key decision that limits how effective subsequent retrieval can be. Often stemming algorithms are used to normaliz...
Paul McNamee, Charles K. Nicholas, James Mayfield
BMCBI
2010
135views more  BMCBI 2010»
13 years 8 months ago
Detecting disease associated modules and prioritizing active genes based on high throughput data
Background: The accumulation of high-throughput data greatly promotes computational investigation of gene function in the context of complex biological systems. However, a biologi...
Yu-Qing Qiu, Shi-Hua Zhang, Xiang-Sun Zhang, Luona...
GI
2009
Springer
13 years 6 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 8 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...