Sciweavers

8614 search results - page 1695 / 1723
» Mining
Sort
View
JSW
2008
101views more  JSW 2008»
13 years 8 months ago
Graphical Mission Specification and Partitioning for Unmanned Underwater Vehicles
- The use of Unmanned Underwater Vehicles (UUVs) has been proposed for several different types of applications including hydrographic surveys (e.g., mapping the ocean floor and exp...
Gary Giger, Mahmut T. Kandemir, John Dzielski
JDWM
2006
178views more  JDWM 2006»
13 years 8 months ago
Improved Data Partitioning for Building Large ROLAP Data Cubes in Parallel
The pre-computation of data cubes is critical to improving the response time of On-Line Analytical Processing (OLAP) systems and can be instrumental in accelerating data mining ta...
Ying Chen, Frank K. H. A. Dehne, Todd Eavis, Andre...
DSS
2007
226views more  DSS 2007»
13 years 8 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
DSS
2007
96views more  DSS 2007»
13 years 8 months ago
Factors relating to the decision to click on a sponsored link
In this paper, we report results of an investigation into the factors influencing the selection of sponsored links by e-commerce Web searchers. In this research, 56 participants e...
Bernard J. Jansen, Anna Brown, Marc Resnick
JMLR
2006
132views more  JMLR 2006»
13 years 8 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
« Prev « First page 1695 / 1723 Last » Next »