Sciweavers

23 search results - page 5 / 5
» Secure Buffering in Firm Real-Time Database Systems
Sort
View
NETWORK
2008
139views more  NETWORK 2008»
13 years 4 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 8 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
14 years 5 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin