Sciweavers

7150 search results - page 1134 / 1430
» Graph-Based Data Mining
Sort
View
TIT
2002
96views more  TIT 2002»
13 years 9 months ago
An axiomatization of partition entropy
Abstract-- The aim of this paper is to present an axiomatization of a generalization of Shannon's entropy starting from partitions of finite sets. The proposed axiomatization ...
Dan A. Simovici, Szymon Jaroszewicz
KES
2010
Springer
13 years 8 months ago
Visualization of Text Streams: A Survey
— This work presents related areas of research, types of data collections that are visualized, technical aspects of generating visualizations, and evaluation methodologies. Exist...
Artur Silic, Bojana Dalbelo Basic
SICHERHEIT
2010
13 years 7 months ago
A Malware Instruction Set for Behavior-Based Analysis
We introduce a new representation for monitored behavior of malicious software called Malware Instruction Set (MIST). The representation is optimized for effective and efficient a...
Philipp Trinius, Carsten Willems, Thorsten Holz, K...
ACL
2009
13 years 7 months ago
Extracting Paraphrases of Technical Terms from Noisy Parallel Software Corpora
In this paper, we study the problem of extracting technical paraphrases from a parallel software corpus, namely, a collection of duplicate bug reports. Paraphrase acquisition is a...
Xiaoyin Wang, David Lo, Jing Jiang, Lu Zhang, Hong...
EVOW
2009
Springer
13 years 7 months ago
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
An ever-present problem in intrusion detection technology is how to construct the patterns of (good, bad or anomalous) behaviour upon which an engine have to make decisions regardi...
Agustín Orfila, Juan M. Estévez-Tapi...
« Prev « First page 1134 / 1430 Last » Next »