Sciweavers

5863 search results - page 1006 / 1173
» An evaluation of the TRIPS computer system
Sort
View
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 2 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
EDBT
2008
ACM
146views Database» more  EDBT 2008»
16 years 2 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra
EDBT
2008
ACM
137views Database» more  EDBT 2008»
16 years 2 months ago
Optimizing away joins on data streams
Abstract. Monitoring aggregates on IP traffic data streams is a compelling application for data stream management systems. Often, such streaming aggregation queries involve joining...
Lukasz Golab, Theodore Johnson, Nick Koudas, Dives...
ICDE
2010
IEEE
252views Database» more  ICDE 2010»
16 years 1 months ago
Semantic Ranking and Result Visualization for Life Sciences Publications
An ever-increasing amount of data and semantic knowledge in the domain of life sciences is bringing about new data management challenges. In this paper we focus on adding the seman...
Julia Stoyanovich, Kenneth A. Ross, William Mee
PERCOM
2007
ACM
16 years 1 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
« Prev « First page 1006 / 1173 Last » Next »