Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2019
The WDC Training Dataset and Gold Standard for Large-Scale Product Matching
WWW '19: Companion Proceedings of The 2019 World Wide Web ConferencePages 381–386https://doi.org/10.1145/3308560.3316609A current research question in the area of entity resolution (also called link discovery or duplicate detection) is whether and in which cases embeddings and deep neural network based matching methods outperform traditional symbolic matching methods. ...
- ArticleOctober 2010
Empirical Evaluation of the Internet Analysis System for Application in the Field of Anomaly Detection
EC2ND '10: Proceedings of the 2010 European Conference on Computer Network DefensePages 63–70https://doi.org/10.1109/EC2ND.2010.10Anomaly detection in computer networks is an actively researched topic in the field of intrusion detection. The Internet Analysis System (IAS) is a software framework which provides passive probes and centralized backend services to collect purely ...
- ArticleMay 2009
A Network Anomaly Detection Method Based on Relative Entropy Theory
ISECS '09: Proceedings of the 2009 Second International Symposium on Electronic Commerce and Security - Volume 01Pages 231–235https://doi.org/10.1109/ISECS.2009.174Network anomaly detection technology has been the research hotspot in intrusion detection (ID) field for many years. However, some issues like high false alarm rate, low detection rate and limited types of attacks which can be detected are still in ...
- articleJune 2007
Ameliorating mental mistakes in tradeoff studies
Systems Engineering (SYSE), Volume 10, Issue 3Pages 222–240Tradeoff studies are broadly recognized and mandated as the method for simultaneously considering multiple alternatives with many criteria, and as such are recommended in the Capability Maturity Model Integration (CMMI) Decision Analysis and Resolution (...