Sciweavers

326 search results - page 11 / 66
» Misuse detection for information retrieval systems
Sort
View
CLEF
2007
Springer
14 years 1 months ago
MIRACLE at ImageCLEFphoto 2007: Evaluation of Merging Strategies for Multilingual and Multimedia Information Retrieval
This paper describes the participation of MIRACLE research consortium at the ImageCLEF Photographic Retrieval task of ImageCLEF 2007. For this campaign, the main purpose of our ex...
Julio Villena-Román, Sara Lana-Serrano, Jos...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 7 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
GIR
2008
ACM
13 years 8 months ago
Mining the web to detect place names
With the aim to improve the quality of gazetteers for geographic information retrieval systems, we present a method to detect place names employed by people submitting information...
Florian A. Twaroch, Philip D. Smart, Christopher B...
KDD
2008
ACM
186views Data Mining» more  KDD 2008»
14 years 7 months ago
Scalable and near real-time burst detection from eCommerce queries
In large scale online systems like Search, eCommerce, or social network applications, user queries represent an important dimension of activities that can be used to study the imp...
Nish Parikh, Neel Sundaresan
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham