Sciweavers

2237 search results - page 438 / 448
» Storing information with extractors
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
ISI
2006
Springer
13 years 7 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
NAR
2008
165views more  NAR 2008»
13 years 7 months ago
4DXpress: a database for cross-species expression pattern comparisons
In the major animal model species like mouse, fish or fly, detailed spatial information on gene expression over time can be acquired through whole mount in situ hybridization expe...
Yannick Haudry, Hugo Berube, Ivica Letunic, Paul-D...
NAR
2008
107views more  NAR 2008»
13 years 7 months ago
ISPIDER Central: an integrated database web-server for proteomics
Despite the growing volumes of proteomic data, integration of the underlying results remains problematic owing to differences in formats, data captured, protein accessions and ser...
Jennifer A. Siepen, Khalid Belhajjame, Julian N. S...
GEOINFORMATICA
2007
223views more  GEOINFORMATICA 2007»
13 years 7 months ago
Algorithms for Nearest Neighbor Search on Moving Object Trajectories
Nearest Neighbor (NN) search has been in the core of spatial and spatiotemporal database research during the last decade. The literature on NN query processing algorithms so far d...
Elias Frentzos, Kostas Gratsias, Nikos Pelekis, Ya...