Sciweavers

1940 search results - page 374 / 388
» Optimizing search engines using clickthrough data
Sort
View
CCS
2011
ACM
12 years 8 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 10 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
BMCBI
2006
113views more  BMCBI 2006»
13 years 8 months ago
GibbsST: a Gibbs sampling method for motif discovery with enhanced resistance to local optima
Background: Computational discovery of transcription factor binding sites (TFBS) is a challenging but important problem of bioinformatics. In this study, improvement of a Gibbs sa...
Kazuhito Shida
IJET
2007
121views more  IJET 2007»
13 years 8 months ago
A Technology Based Program That Matches Enrichment Resources With Student Strengths
Remarkable advances in instructional communication technology (ICT) have now made is possible to provide high levels of enrichment and the kinds of curricular differentiation that...
Joseph S. Renzulli, Sally M. Reis
JASIS
1998
172views more  JASIS 1998»
13 years 8 months ago
Speech Recognition for a Digital Video Library
The standard method for making the full content of audio and video material searchable and is to annotate it with humangenerated meta-data that describes the content in a way that...
Michael J. Witbrock, Alexander G. Hauptmann