Sciweavers

2520 search results - page 503 / 504
» Knowledge Management Challenges in Knowledge Discovery Syste...
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
ISCI
2007
115views more  ISCI 2007»
13 years 7 months ago
Compressed histograms with arbitrary bucket layouts for selectivity estimation
Selectivity estimation is an important step of query optimization in a database management system, and multidimensional histogram techniques have proved promising for selectivity ...
Dennis Fuchs, Zhen He, Byung Suk Lee
AIL
2004
107views more  AIL 2004»
13 years 7 months ago
AI and the Conquest of Complexity in Law
The paper identi es some of the problems with legal systems and outlines the potential of AI technology for overcoming them. For expository purposes, this outline is based on a si...
L. Bibel
BMCBI
2004
189views more  BMCBI 2004»
13 years 7 months ago
B.E.A.R. GeneInfo: A tool for identifying gene-related biomedical publications through user modifiable queries
Background: Once specific genes are identified through high throughput genomics technologies there is a need to sort the final gene list to a manageable size for validation studie...
Guohui Zhou, Xinyu Wen, Hang Liu, Michael J. Schli...
CSCW
2002
ACM
13 years 6 months ago
NetWORKers and their Activity in Intensional Networks
Through ethnographic research, we document the rise of personal social networks in the workplace, which we call intensional networks. Paradoxically, we find that the most fundament...
Bonnie A. Nardi, Steve Whittaker, Heinrich Schwarz