41 |
|
Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints:
|
Masud, M M,Gao, J,Khan, L,Han, J,Thuraisingham, B
|
IEEE Computer Society
|
2011
|
|
|
42 |
|
Design and Implementation of an Intrusion Response System for Relational Databases:
|
Kamra, A,Bertino, E
|
IEEE Computer Society
|
2011
|
|
|
43 |
|
Higher Order Naive Bayes: A Novel Non-IID Approach to Text Classification:
|
Ganiz, M C,George, C,Pottenger, W M
|
IEEE Computer Society
|
2011
|
|
|
44 |
|
KEMB: A Keyword-Based XML Message Broker:
|
Li, G,Feng, J,Wang, J,Zhou, L
|
IEEE Computer Society
|
2011
|
|
|
45 |
|
Frequent Item Computation on a Chip:
|
Teubner, J,Mueller, R,Alonso, G
|
IEEE Computer Society
|
2011
|
|
|
46 |
|
Continuous Monitoring of Distance-Based Range Queries:
|
Cheema, M A,Brankovic, L,Lin, X,Zhang, W,Wang, W
|
IEEE Computer Society
|
2011
|
|
|
47 |
|
Returning Clustered Results for Keyword Search on XML Documents:
|
Liu, X,Wan, C,Chen, L
|
IEEE Computer Society
|
2011
|
|
|
48 |
|
A Fuzzy Logic Approach to Wrapping PDF Documents:
|
Flesca, S,Masciari, E,Tagarelli, A
|
IEEE Computer Society
|
2011
|
|
|
49 |
|
Efficient Periodicity Mining in Time Series Databases Using Suffix Trees:
|
Rasheed, F,Alshalalfa, M,Alhajj, R
|
IEEE Computer Society
|
2011
|
|
|
50 |
|
Exploring Application-Level Semantics for Data Compression:
|
Tsai, H-P,Yang, D-N,Chen, M-S
|
IEEE Computer Society
|
2011
|
|
|