To detect players who are engaged in real-money trading (RMT) in massively multi-player online role-playing games (MMORPGs), behavior of players was analyzed using log data of a c...
In content-based image retrieval (CBIR), relevant images are identified based on their similarities to query images. Most CBIR algorithms are hindered by the semantic gap between ...
Luo Si, Rong Jin, Steven C. H. Hoi, Michael R. Lyu
Problem determination in today's computing environments consumes between 30 and 70% of an organization’s IT resources and represents from one third to one half of their tot...
Log data constitute a relevant aspect in the evaluation process of the quality of a search engine and the quality of a multilingual search service; log data can be used to study t...
Thomas Mandl, Maristella Agosti, Giorgio Maria Di ...
Log data constitutes a relevant aspect in the evaluation process of multilingual search services. Activity logs allow to study the usage of search engines and to better adapt them ...
Thomas Mandl, Giorgio Maria Di Nunzio, Julia Maria...
Abstract. Mobile devices get to handle much information thanks to the convergence of diverse functionalities. Their environment has great potential of supporting customized service...
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
This paper presents a simple and effective method to reduce the size of log data for recovery in main memory databases. Fuzzy checkpointing is known to be very efficient in main ...
The traditional, well established approach to finding out what works in education research is to run a randomized controlled trial (RCT) using a standard pretest and posttest desig...
Zachary A. Pardos, Matthew D. Dailey, Neil T. Heff...
The number of Web-databases has exploded during the last years. In order to justify the development of new information resources, it is essential to know if the use of existing re...