Sciweavers

5435 search results - page 98 / 1087
» Informed Detection Revisited
Sort
View
PLDI
2009
ACM
15 years 11 months ago
Stretching transactional memory
Transactional memory (TM) is an appealing abstraction for programming multi-core systems. Potential target applications for TM, such as business software and video games, are like...
Aleksandar Dragojevic, Rachid Guerraoui, Michal Ka...
WWW
2007
ACM
16 years 4 months ago
Review spam detection
It is now a common practice for e-commerce Web sites to enable their customers to write reviews of products that they have purchased. Such reviews provide valuable sources of info...
Nitin Jindal, Bing Liu
143
Voted
OTM
2010
Springer
15 years 2 months ago
Towards Duplicate Detection for Situation Awareness Based on Spatio-temporal Relations
Abstract. Systems supporting situation awareness typically integrate information about a large number of real-world objects anchored in time and space provided by multiple sources....
Norbert Baumgartner, Wolfgang Gottesheim, Stefan M...
ICAI
2008
15 years 5 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
15 years 5 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi