Sciweavers

62 search results - page 9 / 13
» Using uncleanliness to predict future botnet addresses
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 7 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
ICDM
2006
IEEE
214views Data Mining» more  ICDM 2006»
14 years 1 months ago
Forecasting Skewed Biased Stochastic Ozone Days: Analyses and Solutions
Much work on skewed, stochastic, high dimensional, and biased datasets usually implicitly solve each problem separately. Recently however, we have been approached by Texas Commiss...
Kun Zhang, Wei Fan, Xiaojing Yuan, Ian Davidson, X...
INFOCOM
2012
IEEE
11 years 10 months ago
Scaling social media applications into geo-distributed clouds
—Federation of geo-distributed cloud services is a trend in cloud computing which, by spanning multiple data centers at different geographical locations, can provide a cloud plat...
Yu Wu, Chuan Wu, Bo Li 0001, Linquan Zhang, Zongpe...
WWW
2010
ACM
14 years 2 months ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
BMCBI
2007
106views more  BMCBI 2007»
13 years 7 months ago
Mining prokaryotic genomes for unknown amino acids: a stop-codon-based approach
Background: Selenocysteine and pyrrolysine are the 21st and 22nd amino acids, which are genetically encoded by stop codons. Since a number of microbial genomes have been completel...
Masashi Fujita, Hisaaki Mihara, Susumu Goto, Nobuy...