Event data

Results: 1868



#Item
611Database theory / Query languages / MySQL / Cognition / Information systems / Complex event processing / Radio-frequency identification / Relational database / StreamSQL / Computing / Data management / Software

DejaVu: Declarative Pattern Matching over ∗ Live and Archived Streams of Events Nihal Dindar, Barı¸s Güç, Patrick Lau, Aslı Özal, Merve Soner, Nesime Tatbul Systems Group, Department of Computer Science, ETH Zuri

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2009-04-25 11:29:12
612Data collection / Information technology management / Unstructured data / Information / Science / Data set / Support vector machine / Analysis / Abstract / Statistics / Data management / Business intelligence

Automatic sentence classifier using sentence ordering features for Event Based Medicine: Shared task system description Spandana Gella University of Melbourne [removed]

Add to Reading List

Source URL: www.alta.asn.au

Language: English - Date: 2012-11-29 20:03:05
613Cyberwarfare / Data security / Security information and event management / National security / Database activity monitoring / Threat / Targeted threat / McAfee / Security event manager / Computer security / Security / Computer network security

Special Report When Minutes Count How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack.

Add to Reading List

Source URL: www.mcafee.com

Language: English
614Data / Animal-powered transport / Equus / Horse / Livestock / Trademark / Copyright / Equidae / Intellectual property law / Information

Legal Notice Website Provisions Southern National Draft Horse Pull maintains this Site for the purpose of disseminating information and communications on and about our event. Southern National Draft Horse Pull retains al

Add to Reading List

Source URL: www.southernnationaldrafthorsepull.com

Language: English - Date: 2014-11-20 23:07:10
615Ethology / Business intelligence / Machine learning / Statistical models / Cross-validation / Model selection / Data analysis / Scientific modelling / Visualization / Statistics / Science / Scientific method

Visualizing Accuracy to Improve Predictive Model Performance David Gotz and Jimeng Sun Fig. 1. This screenshot shows a modified version of a temporal event sequence visualization called DecisionFlow [2]. It has been conn

Add to Reading List

Source URL: predictive-workshop.github.io

Language: English - Date: 2014-10-21 11:34:48
616Data management / Disaster preparedness / Humanitarian aid / Occupational safety and health / Database / Data center / Disaster recovery / Business continuity planning / Computing / Concurrent computing / Emergency management

Microsoft Word - Modeling an Event Article - Final.doc

Add to Reading List

Source URL: www.telcoa.org

Language: English - Date: 2011-04-25 15:12:35
617Cyberwarfare / Data security / Security information and event management / National security / Database activity monitoring / Threat / Targeted threat / McAfee / Security event manager / Computer security / Security / Computer network security

Special Report When Minutes Count How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-16 13:56:32
618Cyberwarfare / Data security / Security information and event management / National security / Database activity monitoring / Threat / Targeted threat / McAfee / Security event manager / Computer security / Security / Computer network security

Special Report When Minutes Count How experts fight advanced threats with real-time SIEM and identification of eight key indicators of attack.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-16 13:56:32
619Information technology management / Network management / Security information and event management / Security event manager / Correlation and dependence / Syslog / Security / Computer security / Computing / Data security

CryptTech Inc. CryptTECH CryptoSIM, CryptoLOG, CryptoSPOT Information Security Intelligence

Add to Reading List

Source URL: www.crypttech.com

Language: English - Date: 2014-08-26 08:33:17
620Militia / Violence / Riot / Sudan / Palestinian political violence / Uppsala Conflict Data Program / Africa / Political geography / Earth

Armed Conflict Location & Event Data Project (ACLED) User Guide January[removed]Further information and maps, data, trends and publications can be found at www.acleddata.com or

Add to Reading List

Source URL: www.acleddata.com

Language: English - Date: 2015-03-11 08:19:56
UPDATE