Sciweavers

1466 search results - page 238 / 294
» ABL: Alignment-Based Learning
Sort
View
RAID
2000
Springer
15 years 1 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
VLDB
2000
ACM
135views Database» more  VLDB 2000»
15 years 1 months ago
Telcordia's Database Reconciliation and Data Quality Analysis Tool
This demonstration illustrates how a comprehensive database reconciliation tool can provide the ability to characterize data-quality and data-reconciliation issues in complex real...
Francesco Caruso, Munir Cochinwala, Uma Ganapathy,...
ESOP
2010
Springer
15 years 1 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers
EWSN
2010
Springer
15 years 1 months ago
An Adaptive Strategy for Energy-Efficient Data Collection in Sparse Wireless Sensor Networks
Sparse wireless sensor networks (WSNs) are being effectively used in several applications, which include transportation, urban safety, environment monitoring, and many others. Sens...
Mario Di Francesco, Kunal Shah, Mohan Kumar, Giuse...
ICPR
2010
IEEE
15 years 27 days ago
Detecting Faint Compact Sources Using Local Features and a Boosting Approach
Several techniques have been proposed so far in order to perform faint compact source detection in wide field interferometric radio images. However, all these methods can easily mi...
Albert Torrent, Marta Peracaula, Xavier Llado, Jor...