Sciweavers

60 search results - page 12 / 12
» A Performance Study of Secure Data Mining on the Cell Proces...
Sort
View
CCS
2009
ACM
13 years 9 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
SC
2004
ACM
13 years 11 months ago
A Parallel Visualization Pipeline for Terascale Earthquake Simulations
This paper presents a parallel visualization pipeline implemented at the Pittsburgh Supercomputing Center (PSC) for studying the largest earthquake simulation ever performed. The ...
Hongfeng Yu, Kwan-Liu Ma, Joel Welling
EDBT
2010
ACM
135views Database» more  EDBT 2010»
14 years 1 months ago
Region-based online promotion analysis
This paper addresses a fundamental and challenging problem with broad applications: efficient processing of region-based promotion queries, i.e., to discover the top-k most inter...
Tianyi Wu, Yizhou Sun, Cuiping Li, Jiawei Han
TKDE
2008
125views more  TKDE 2008»
13 years 6 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
IPPS
2009
IEEE
14 years 27 days ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...