The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Unstructured open source information, especially the social, political, economic and cultural events described within web-based text/news articles, often contain possible motives for cyber security and trust issues. Automated processing of numerous open source intelligence sources requires the discovery of key domain terms, their conceptual hierarchies and the coherent relationships among them. A...
This paper provides an overview of the new secure Web interface for the Medical Research Council (MRC) National Survey of Health and Development (NSHD), which is a Web-based data and metadata access system for the longest-running longitudinal study of health in the world. Accessing NSHD metadata and data has often been a challenge for external (non-MRC) users, because the underlying data and metadata...
The following topics are dealt with: databases; algorithms; Web applications; e-technology; real time systems; artificial intelligence and applications; software engineering; networking; security; information retrieval; image processing; multiagent; genetic algorithms; signal processing; pattern recognition and applications; neural networks; data mining; parallel and distributed computing; software...
The following topics are dealt with: software agent; grid computing; data security; software architecture; multimedia system; mobile sensor wireless networks; peer-to-peer computing; data mining; e-business systems; XML technologies; network protocol; embedded system; RFID; text information retrieval; Web content analysis; and network traffic.
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
The following topics are dealt with: intelligent computing; machine learning and neural networks; supply chain management; data mining; rough set; information retrieval; e-learning and e-business; multimedia information processing; support vector machine; knowledge engineering; workflow management; information security; communication technology and signal processing; information hiding and watermarking;...
This article has provided a brief overview of how the marriage of speech and language technologies with the Web is changing the way people communicate and access information. Advances are happening at a rapid pace through improved algorithms, wider penetration of the Web, availability of data, and faster computing. As the Web continues to evolve, research initiatives need to continue to address difficult...
Data mining and knowledge discovery in databases are important research areas that investigate the automatic extraction of previously unknown patterns from large amounts of data. The field connects the three worlds of databases, artificial intelligence and statistics. However, the usefulness of this data is negligible if meaningful information or knowledge cannot be extracted from it. Data mining...
The following topics are dealt with: distributed systems; Web services; data security; fault tolerance; multimedia system; grid computing; mobile computing; peer-to-peer computing; query processing; knowledge representation; knowledge acquisition; knowledge discovery; data mining; information retrieval; business process monitoring; database mobility
The following topics are dealt with: shared and collaborative cyberworlds; information security; data retrieval; data mining; human computer interaction; humanized interfaces; cyber-education; distributed cyberworlds; cyber-business; language understanding; real world interaction agents; and Web computing
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.