Sciweavers

1768 search results - page 263 / 354
» Mining Very Large Databases
Sort
View
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 10 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
ESWA
2008
231views more  ESWA 2008»
13 years 10 months ago
Automatic generation of concept hierarchies using WordNet
This paper examines and proposes the automatic generation of concept hierarchies using WordNet. Existing researches have mostly explored the utilization of concept hierarchies, bu...
Sangno Lee, Soon-Young Huh, Ronald D. McNiel
VLDB
1998
ACM
173views Database» more  VLDB 1998»
13 years 9 months ago
Fast Image Retrieval Using Color-Spatial Information
Abstract. In this paper, we present an image retrieval system that employs both the color and spatial information of images to facilitate the retrieval process. The basic unit used...
Beng Chin Ooi, Kian-Lee Tan, Tat-Seng Chua, Wynne ...
FGR
2011
IEEE
272views Biometrics» more  FGR 2011»
13 years 1 months ago
Adaptive discriminant analysis for face recognition from single sample per person
—Discriminant analysis, especially Fisherface and its numerous variants, have achieved great success in face recognition. However, these methods fail to work for face recognition...
Meina Kan, Shiguang Shan, Yu Su, Xilin Chen, Wen G...
VLDB
2004
ACM
92views Database» more  VLDB 2004»
14 years 3 months ago
Write-Optimized B-Trees
Large writes are beneficial both on individual disks and on disk arrays, e.g., RAID-5. The presented design enables large writes of internal B-tree nodes and leaves. It supports b...
Goetz Graefe