Sciweavers

123 search results - page 15 / 25
» Trash article detection using categorization techniques
Sort
View
JCDL
2005
ACM
90views Education» more  JCDL 2005»
14 years 8 days ago
An initial evaluation of automated organization for digital library browsing
In this article we present an evaluation of text clustering and classification methods for creating digital library browse interfaces, focusing on the particular case of collecti...
Aaron Krowne, Martin Halbert
ACSAC
2008
IEEE
14 years 1 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
DL
1998
Springer
111views Digital Library» more  DL 1998»
13 years 11 months ago
SONIA: A Service for Organizing Networked Information Autonomously
The recent explosion of on-line information in Digital Libraries and on the World Wide Web has given rise to a number of query-based search engines and manually constructed topica...
Mehran Sahami, Salim Yusufali, Michelle Q. Wang Ba...
CSDA
2008
128views more  CSDA 2008»
13 years 6 months ago
Classification tree analysis using TARGET
Tree models are valuable tools for predictive modeling and data mining. Traditional tree-growing methodologies such as CART are known to suffer from problems including greediness,...
J. Brian Gray, Guangzhe Fan
VIZSEC
2005
Springer
14 years 6 days ago
A Visualization Methodology for Characterization of Network Scans
Many methods have been developed for monitoring network traffic, both using visualization and statistics. Most of these methods focus on the detection of suspicious or malicious ...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti