Sciweavers

2370 search results - page 3 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 8 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
BIBE
2008
IEEE
14 years 7 days ago
VIP: Visualization of integrated proteomics data
—The post-genomic era is characterized by the rapid data accumulation leading to unwieldy and large volumes of biological data. The proteomics results (large sets of identified p...
Eugenia G. Giannopoulou, Giorgos Lepouras, Elias S...
ICDM
2009
IEEE
120views Data Mining» more  ICDM 2009»
14 years 13 days ago
Least Square Incremental Linear Discriminant Analysis
Abstract—Linear discriminant analysis (LDA) is a wellknown dimension reduction approach, which projects highdimensional data into a low-dimensional space with the best separation...
Li-Ping Liu, Yuan Jiang, Zhi-Hua Zhou
SECURWARE
2008
IEEE
14 years 4 days ago
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied o...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
SCHEDULING
2010
116views more  SCHEDULING 2010»
13 years 4 months ago
Characterizing sets of jobs that admit optimal greedy-like algorithms
The “ Priority Algorithm” is a model of computation introduced by Borodin, Nielsen and Rackoff [BNR03] which formulates a wide class of greedy algorithms. For an arbitrary se...
Periklis A. Papakonstantinou, Charles Rackoff