Sciweavers

1997 search results - page 64 / 400
» A Model for Data Leakage Detection
Sort
View
GVD
2009
108views Database» more  GVD 2009»
14 years 9 months ago
Privacy Challenges for Database Systems
Over the last years the means to collect personal data implicitly or explicitly over the Web and by various kinds of sensors and to combine data for profiling individuals has dram...
Johann Christoph Freytag
CVPR
2012
IEEE
13 years 2 months ago
Occlusion reasoning for object detection under arbitrary viewpoint
We present a unified occlusion model for object instance detection under arbitrary viewpoint. Whereas previous approaches primarily modeled local coherency of occlusions or attem...
Edward Hsiao, Martial Hebert
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
15 years 12 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
ATVA
2009
Springer
89views Hardware» more  ATVA 2009»
15 years 6 months ago
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
We present a data symmetry reduction approach for model temporal-epistemic logic. The technique abstracts the epistemic indistinguishably relation for the knowledge operators, and ...
Mika Cohen, Mads Dam, Alessio Lomuscio, Hongyang Q...
KDD
2005
ACM
178views Data Mining» more  KDD 2005»
15 years 5 months ago
Failure detection and localization in component based systems by online tracking
The increasing complexity of today’s systems makes fast and accurate failure detection essential for their use in mission-critical applications. Various monitoring methods provi...
Haifeng Chen, Guofei Jiang, Cristian Ungureanu, Ke...