Found: 30
Select item for more details and to access through your institution.
Multimedia Data Mining and Knowledge Discovery.
- Published in:
- Journal of Electronic Imaging, 2008, v. 17, n. 4, p. 49901
- By:
- Publication type:
- Article
A REPOSITORY FOR COMPONENT-BASED EMBEDDED SOFTWARE DEVELOPMENT.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2006, v. 16, n. 4, p. 523, doi. 10.1142/S0218194006002872
- By:
- Publication type:
- Article
Relationalization of provenance data in complex RDF reification nodes.
- Published in:
- Electronic Commerce Research, 2010, v. 10, n. 3/4, p. 389, doi. 10.1007/s10660-010-9061-1
- By:
- Publication type:
- Article
Predicting WWW surfing using multiple evidence combination.
- Published in:
- VLDB Journal International Journal on Very Large Data Bases, 2008, v. 17, n. 3, p. 401, doi. 10.1007/s00778-006-0014-1
- By:
- Publication type:
- Article
EVOLVING INSIDER THREAT DETECTION STREAM MINING PERSPECTIVE.
- Published in:
- International Journal on Artificial Intelligence Tools, 2013, v. 22, n. 5, p. -1, doi. 10.1142/S0218213013600130
- By:
- Publication type:
- Article
HIERARCHICAL CLUSTERING FOR COMPLEX DATA.
- Published in:
- International Journal on Artificial Intelligence Tools, 2005, v. 14, n. 5, p. 791, doi. 10.1142/S0218213005002399
- By:
- Publication type:
- Article
Community perceptions of landslide risk and susceptibility: a multi-country study.
- Published in:
- Landslides, 2023, v. 20, n. 6, p. 1321, doi. 10.1007/s10346-023-02027-5
- By:
- Publication type:
- Article
Multimodal concept fusion using semantic closeness for image concept disambiguation.
- Published in:
- Multimedia Tools & Applications, 2012, v. 61, n. 1, p. 69, doi. 10.1007/s11042-010-0707-8
- By:
- Publication type:
- Article
Introduction.
- Published in:
- Knowledge & Information Systems, 2006, v. 10, n. 2, p. 133, doi. 10.1007/s10115-006-0030-x
- By:
- Publication type:
- Article
Real-time classification of variable length multi-attribute motions.
- Published in:
- Knowledge & Information Systems, 2006, v. 10, n. 2, p. 163, doi. 10.1007/s10115-005-0223-8
- By:
- Publication type:
- Article
A study of the model and algorithms for handling location-dependent continuous queries.
- Published in:
- Knowledge & Information Systems, 2005, v. 8, n. 4, p. 414, doi. 10.1007/s10115-005-0196-7
- By:
- Publication type:
- Article
Online anomaly detection for multi-source VMware using a distributed streaming framework.
- Published in:
- Software: Practice & Experience, 2016, v. 46, n. 11, p. 1479, doi. 10.1002/spe.2390
- By:
- Publication type:
- Article
GISQAF: MapReduce guided spatial query processing and analytics system.
- Published in:
- Software: Practice & Experience, 2016, v. 46, n. 10, p. 1329, doi. 10.1002/spe.2383
- By:
- Publication type:
- Article
Implementation and performance evaluation of a scheduling algorithm for divisible load parallel applications in a cloud computing environment.
- Published in:
- Software: Practice & Experience, 2015, v. 45, n. 6, p. 765, doi. 10.1002/spe.2258
- By:
- Publication type:
- Article
Rapid goal-oriented automated software testing using MEA-graph planning.
- Published in:
- Software Quality Journal, 2007, v. 15, n. 3, p. 241, doi. 10.1007/s11219-007-9018-3
- By:
- Publication type:
- Article
Objective Risk Evaluation for Automated Security Management.
- Published in:
- Journal of Network & Systems Management, 2011, v. 19, n. 3, p. 343, doi. 10.1007/s10922-010-9177-6
- By:
- Publication type:
- Article
Constructing gene co-expression networks and predicting functionsof unknown genes by random matrix theory.
- Published in:
- BMC Bioinformatics, 2007, v. 8, p. 299, doi. 10.1186/1471-2105-8-299
- By:
- Publication type:
- Article
A scalable multi-level feature extraction technique to detect malicious executables.
- Published in:
- Information Systems Frontiers, 2008, v. 10, n. 1, p. 33, doi. 10.1007/s10796-007-9054-3
- By:
- Publication type:
- Article
An Adaptive Probe-Based Technique to Optimize Join Queries in Distributed Internet Databases.
- Published in:
- Journal of Database Management, 2001, v. 12, n. 4, p. 3, doi. 10.4018/jdm.2001100101
- By:
- Publication type:
- Article
Secure data processing for IoT middleware systems.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 4684, doi. 10.1007/s11227-018-2686-x
- By:
- Publication type:
- Article
A dynamically growing self-organizing tree (DGSOT) for hierarchical clustering gene expression profiles.
- Published in:
- Bioinformatics, 2004, v. 20, n. 16, p. 2605, doi. 10.1093/bioinformatics/bth292
- By:
- Publication type:
- Article
Emergency Response Applications: Dynamic Plume Modeling and Real-Time Routing.
- Published in:
- IEEE Internet Computing, 2008, v. 12, n. 1, p. 38, doi. 10.1109/MIC.2008.11
- By:
- Publication type:
- Article
Policy Enforcement System for Inter-Organizaitonal Data Sharing.
- Published in:
- International Journal of Information Security & Privacy, 2010, v. 4, n. 3, p. 22, doi. 10.4018/jisp.2010070102
- By:
- Publication type:
- Article
Security Issues for Cloud Computing.
- Published in:
- International Journal of Information Security & Privacy, 2010, v. 4, n. 2, p. 36, doi. 10.4018/jisp.2010040103
- By:
- Publication type:
- Article
Optimized ontology-driven query expansion using map-reduce framework to facilitate federated queries.
- Published in:
- Computer Systems Science & Engineering, 2012, v. 27, n. 2, p. 103
- By:
- Publication type:
- Article
Facing the reality of data stream classification: coping with scarcity of labeled data.
- Published in:
- Knowledge & Information Systems, 2012, v. 33, n. 1, p. 213, doi. 10.1007/s10115-011-0447-8
- By:
- Publication type:
- Article
Design and Implementation of a Framework for Assured Information Sharing Across Organizational Boundaries.
- Published in:
- International Journal of Information Security & Privacy, 2008, v. 2, n. 4, p. 67, doi. 10.4018/jisp.2008100104
- By:
- Publication type:
- Article
E-Mail Worm Detection Using Data Mining.
- Published in:
- International Journal of Information Security & Privacy, 2007, v. 1, n. 4, p. 47, doi. 10.4018/jisp.2007100103
- By:
- Publication type:
- Article
A framework for a video analysis tool for suspicious event detection.
- Published in:
- Multimedia Tools & Applications, 2007, v. 35, n. 1, p. 109, doi. 10.1007/s11042-007-0117-8
- By:
- Publication type:
- Article
Potential diagnosis of COVID-19 from chest X-ray and CT findings using semi-supervised learning.
- Published in:
- Physical & Engineering Sciences in Medicine, 2022, v. 45, n. 1, p. 31, doi. 10.1007/s13246-021-01075-2
- By:
- Publication type:
- Article