Sciweavers

80 search results - page 14 / 16
» An integrated approach for deriving priorities in analytic n...
Sort
View
PVLDB
2008
116views more  PVLDB 2008»
13 years 5 months ago
Tighter estimation using bottom k sketches
Summaries of massive data sets support approximate query processing over the original data. A basic aggregate over a set of records is the weight of subpopulations specified as a ...
Edith Cohen, Haim Kaplan
CIA
2008
Springer
13 years 7 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
DEXA
2005
Springer
148views Database» more  DEXA 2005»
13 years 11 months ago
XG: A Data-Driven Computation Grid for Enterprise-Scale Mining
In this paper we introduce a novel architecture for data processing, based on a functional fusion between a data and a computation layer. We show how such an architecture can be le...
Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-...
IICAI
2007
13 years 7 months ago
Topologically Continuous Associative Memory: A Theoretical Foundation
We introduce a neural network with associative memory and a continuous topology, i.e. its processing units are elements of a continuous metric space and the state space is Euclide...
Enrique Carlos Segura
MOBICOM
2004
ACM
13 years 11 months ago
Analyzing the spread of active worms over VANET
Interactive communications among nodes in Vehicular Ad Hoc Networks (VANET) and the safety-oriented nature of many VANET applications necessitate a robust security framework. An a...
Syed A. Khayam, Hayder Radha