Sciweavers

3895 search results - page 700 / 779
» Measuring the effectiveness of ACATS
Sort
View
RAID
2004
Springer
14 years 3 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
SPIRE
2004
Springer
14 years 3 months ago
Evaluating Relevance Feedback and Display Strategies for Searching on Small Displays
Abstract Searching information resources using mobile devices is affected by displays on which only a small fraction of the set of ranked documents can be displayed. In this study ...
Vishwa Vinay, Ingemar J. Cox, Natasa Milic-Fraylin...
VLDB
2004
ACM
143views Database» more  VLDB 2004»
14 years 3 months ago
GPX: Interactive Mining of Gene Expression Data
Discovering co-expressed genes and coherent expression patterns in gene expression data is an important data analysis task in bioinformatics research and biomedical applications. ...
Daxin Jiang, Jian Pei, Aidong Zhang
WEBI
2004
Springer
14 years 3 months ago
TSSP: A Reinforcement Algorithm to Find Related Papers
Content analysis and citation analysis are two common methods in recommending system. Compared with content analysis, citation analysis can discover more implicitly related papers...
Shen Huang, Gui-Rong Xue, Benyu Zhang, Zheng Chen,...
CBMS
2003
IEEE
14 years 3 months ago
Localizing Contour Points for Indexing an X-Ray Image Retrieval System
Vertebra shape can effectively describe various pathologies found in spine x-ray images. There are some critical regions on the shape contour which help determine whether the shap...
Xiaoqian Xu, D. J. Lee, Sameer Antani, L. Rodney L...