Sciweavers

566 search results - page 99 / 114
» Using Queries to Associate Metadata with Data
Sort
View
CCS
2003
ACM
14 years 1 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
APWEB
2003
Springer
14 years 4 days ago
Mining "Hidden Phrase" Definitions from the Web
Keyword searching is the most common form of document search on the Web. Many Web publishers manually annotate the META tags and titles of their pages with frequently queried phras...
Hung V. Nguyen, P. Velamuru, Deepak Kolippakkam, H...
SPIESR
1996
122views Database» more  SPIESR 1996»
13 years 9 months ago
Retrieval by Content in Symbolic-Image Databases
Two approaches for integrating images into the framework of a database management system are presented. The classi cation approach preprocesses all images and attaches a semantic ...
Aya Soffer, Hanan Samet
CIKM
2011
Springer
12 years 8 months ago
Hybrid models for future event prediction
We present a hybrid method to turn off-the-shelf information retrieval (IR) systems into future event predictors. Given a query, a time series model is trained on the publication...
Giuseppe Amodeo, Roi Blanco, Ulf Brefeld
TVCG
2008
96views more  TVCG 2008»
13 years 8 months ago
Visualization of Cellular and Microvascular Relationships
Understanding the structure of microvasculature structures and their relationship to cells in biological tissue is an important and complex problem. Brain microvasculature in parti...
David Mayerich, Louise Abbott, John Keyser