This paper reports the results of a study of Web usage of 139 users over a 8 month period of time. It uses a longitudinal Web log analysis of the URLs accessed during 33916 user-d...
Mario Christ, Steffan Baron, Ramayya Krishnan, Dan...
This paper proposes simple techniques for handling place references in search engine queries, an important aspect of geographical information retrieval. We address not only the de...
We introduce a regularized kernel-based rule for unsupervised change detection based on a simpler version of the recently proposed kernel Fisher discriminant ratio. Compared to ot...
Software developers often do not build software from scratch but reuse software libraries. In theory, the APIs of a library should be stable, but in practice they do change and th...
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...