Sciweavers

55 search results - page 5 / 11
» Misuse Detection in Database Systems Through User Profiling
Sort
View
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 6 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu
BMCBI
2008
75views more  BMCBI 2008»
13 years 7 months ago
Re-searcher: a system for recurrent detection of homologous protein sequences
Background: Sequence searches are routinely employed to detect and annotate related proteins. However, a rapid growth of databases necessitates a frequent repetition of sequence s...
Valdemaras Repsys, Mindaugas Margelevicius, Ceslov...
CIKM
2010
Springer
13 years 2 months ago
On bootstrapping recommender systems
Recommender systems perform much better on users for which they have more information. This gives rise to a problem of satisfying users new to a system. The problem is even more a...
Nadav Golbandi, Yehuda Koren, Ronny Lempel
CVPR
2009
IEEE
15 years 2 months ago
Building a database of 3D scenes from user annotations
In this paper, we wish to build a high quality database of images depicting scenes, along with their real-world threedimensional (3D) coordinates. Such a database is useful for ...
Antonio B. Torralba, Bryan C. Russell
RECSYS
2009
ACM
14 years 1 months ago
Conceptual recommender system for CiteSeerX
Short search engine queries do not provide contextual information, making it difficult for traditional search engines to understand what users are really requesting. One approach ...
Ajith Kodakateri Pudhiyaveetil, Susan Gauch, Hiep ...