Distance function computation is a key subtask in many data mining algorithms and applications. The most effective form of the distance function can only be expressed in the conte...
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
This work-in-progress report presents the groundwork for the design of a user-adaptive web-based e-learning system. A survey and two randomized controlled experiments were carried...
Tagclouds are visual presentations of a set of words, typically a set of "tags" selected by some rationale, in which attributes of the text such as size, weight, or colo...
A. W. Rivadeneira, Daniel M. Gruen, Michael J. Mul...