Sciweavers

926 search results - page 181 / 186
» Large Scale Data Mining: Challenges and Responses
Sort
View
JUCS
2008
112views more  JUCS 2008»
13 years 10 months ago
Knowledge Processing in Intelligent Systems
Abstract: Intelligence and Knowledge play more and more important roles in building complex intelligent systems, for instance, intrusion detection systems, and operational analysis...
Longbing Cao, Ngoc Thanh Nguyen
BMCBI
2005
102views more  BMCBI 2005»
13 years 10 months ago
Genome-wide identification of the regulatory targets of a transcription factor using biochemical characterization and computatio
Background: A major challenge in computational genomics is the development of methodologies that allow accurate genome-wide prediction of the regulatory targets of a transcription...
Emmitt R. Jolly, Chen-Shan Chin, Ira Herskowitz, H...
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 4 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
AAAI
2008
14 years 1 months ago
A Utility-Theoretic Approach to Privacy and Personalization
Online services such as web search, news portals, and ecommerce applications face the challenge of providing highquality experiences to a large, heterogeneous user base. Recent ef...
Andreas Krause, Eric Horvitz
JAIR
2010
143views more  JAIR 2010»
13 years 9 months ago
A Utility-Theoretic Approach to Privacy in Online Services
Online offerings such as web search, news portals, and e-commerce applications face the challenge of providing high-quality service to a large, heterogeneous user base. Recent eff...
Andreas Krause, Eric Horvitz