Sciweavers

666 search results - page 98 / 134
» When Similar Problems Don't Have Similar Solutions
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
BIBM
2008
IEEE
172views Bioinformatics» more  BIBM 2008»
14 years 2 months ago
Boosting Methods for Protein Fold Recognition: An Empirical Comparison
Protein fold recognition is the prediction of protein’s tertiary structure (Fold) given the protein’s sequence without relying on sequence similarity. Using machine learning t...
Yazhene Krishnaraj, Chandan K. Reddy
ICDM
2008
IEEE
147views Data Mining» more  ICDM 2008»
14 years 2 months ago
Clustering Documents with Active Learning Using Wikipedia
Wikipedia has been applied as a background knowledge base to various text mining problems, but very few attempts have been made to utilize it for document clustering. In this pape...
Anna Huang, David N. Milne, Eibe Frank, Ian H. Wit...
INFOCOM
2008
IEEE
14 years 2 months ago
Cyber-Fraud is One Typo Away
Abstract— Spelling errors when typing a URL can be exploited by website-squatters: users are led to phony sites in a phenomenon we call parasitic URL naming. These phony sites im...
Anirban Banerjee, Dhiman Barman, Michalis Faloutso...
WAIM
2005
Springer
14 years 1 months ago
Research Paper Recommender Systems: A Subspace Clustering Approach
Researchers from the same lab often spend a considerable amount of time searching for published articles relevant to their current project. Despite having similar interests, they c...
Nitin Agarwal, Ehtesham Haque, Huan Liu, Lance Par...