Sciweavers

361 search results - page 67 / 73
» On Mining Web Access Logs
Sort
View
ICDM
2007
IEEE
140views Data Mining» more  ICDM 2007»
14 years 1 months ago
Sequential Change Detection on Data Streams
Model-based declarative queries are becoming an attractive paradigm for interacting with many data stream applications. This has led to the development of techniques to accurately...
S. Muthukrishnan, Eric van den Berg, Yihua Wu
ACSAC
2005
IEEE
14 years 3 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
ICDM
2010
IEEE
205views Data Mining» more  ICDM 2010»
13 years 7 months ago
Knowledge File System -- A Principled Approach to Personal Information Management
The Knowledge File System (KFS) is a smart virtual file system that sits between the operating system and the file system. Its primary functionality is to automatically organize fi...
Kuiyu Chang, I. Wayan Tresna Perdana, Bramandia Ra...
BMCBI
2008
126views more  BMCBI 2008»
13 years 10 months ago
GeneChaser: Identifying all biological and clinical conditions in which genes of interest are differentially expressed
Background: The amount of gene expression data in the public repositories, such as NCBI Gene Expression Omnibus (GEO) has grown exponentially, and provides a gold mine for bioinfo...
Rong Chen, Rohan Mallelwar, Ajit Thosar, Shivkumar...
CIKM
2004
Springer
14 years 3 months ago
Local methods for estimating pagerank values
The Google search engine uses a method called PageRank, together with term-based and other ranking techniques, to order search results returned to the user. PageRank uses link ana...
Yen-Yu Chen, Qingqing Gan, Torsten Suel