Sciweavers

878 search results - page 147 / 176
» A Compiler-Based Approach to Data Security
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 10 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
15 years 3 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
EDBT
2009
ACM
113views Database» more  EDBT 2009»
15 years 4 months ago
Type-based categorization of relational attributes
In this work we concentrate on categorization of relational attributes based on their data type. Assuming that attribute type/characteristics are unknown or unidentifiable, we an...
Babak Ahmadi, Marios Hadjieleftheriou, Thomas Seid...
DAGSTUHL
2009
14 years 11 months ago
Learning Highly Structured Manifolds: Harnessing the Power of SOMs
Abstract. In this paper we elaborate on the challenges of learning manifolds that have many relevant clusters, and where the clusters can have widely varying statistics. We call su...
Erzsébet Merényi, Kadim Tasdemir, Li...
CORR
2008
Springer
119views Education» more  CORR 2008»
14 years 8 months ago
Unified storage systems for distributed Tier-2 centres
The start of data taking at the Large Hadron Collider will herald a new era in data volumes and distributed processing in particle physics. Data volumes of hundreds of Terabytes wi...
Greig A. Cowan, Graeme A. Stewart, Andrew Elwell