Sciweavers

4207 search results - page 747 / 842
» Stable Analysis Patterns
Sort
View
SIGIR
2008
ACM
13 years 8 months ago
Classifiers without borders: incorporating fielded text from neighboring web pages
Accurate web page classification often depends crucially on information gained from neighboring pages in the local web graph. Prior work has exploited the class labels of nearby p...
Xiaoguang Qi, Brian D. Davison
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 8 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
IPM
2007
158views more  IPM 2007»
13 years 8 months ago
Validation and interpretation of Web users' sessions clusters
Understanding users’ navigation on the Web is important towards improving the quality of information and the speed of accessing large-scale Web data sources. Clustering of users...
George Pallis, Lefteris Angelis, Athena Vakali
IVC
2007
130views more  IVC 2007»
13 years 8 months ago
Attribute-space connectivity and connected filters
In this paper connected operators from mathematical morphology are extended to a wider class of operators, which are based on connectivities in higher-dimensional spaces, similar ...
Michael H. F. Wilkinson
TMC
2008
146views more  TMC 2008»
13 years 8 months ago
General Network Lifetime and Cost Models for Evaluating Sensor Network Deployment Strategies
In multihop wireless sensor networks that are often characterized by many-to-one (convergecast) traffic patterns, problems related to energy imbalance among sensors often appear. S...
Zhao Cheng, Mark A. Perillo, Wendi B. Heinzelman