Sciweavers

1997 search results - page 9 / 400
» A Model for Data Leakage Detection
Sort
View
DAC
2007
ACM
16 years 19 days ago
Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement
Negative bias temperature instability (NBTI) in MOSFETs is one of the major reliability challenges in nano-scale technology. This paper presents an efficient technique to characte...
Kunhyuk Kang, Kee-Jong Kim, Ahmad E. Islam, Muhamm...
ICPR
2010
IEEE
14 years 10 months ago
Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT
The quality of the lung nodule models determines the success of lung nodule detection. This paper describes aspects of our data-driven approach for modeling lung nodules using the...
Amal Farag, James Graham, Aly A. Farag
BIOSURVEILLANCE
2007
Springer
15 years 5 months ago
A Bayesian Biosurveillance Method That Models Unknown Outbreak Diseases
Algorithms for detecting anomalous events can be divided into those that are designed to detect specific diseases and those that are non-specific in what they detect. Specific dete...
Yanna Shen, Gregory F. Cooper
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 3 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 3 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok