Sciweavers

12257 search results - page 2272 / 2452
» Analysis of Algorithms
Sort
View
CSFW
2007
IEEE
15 years 9 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
118
Voted
ICDM
2007
IEEE
166views Data Mining» more  ICDM 2007»
15 years 9 months ago
Mining Statistical Information of Frequent Fault-Tolerant Patterns in Transactional Databases
Constraints applied on classic frequent patterns are too strict and may cause interesting patterns to be missed. Hence, researchers have proposed to mine a more relaxed version of...
Ardian Kristanto Poernomo, Vivekanand Gopalkrishna...
ICDM
2007
IEEE
149views Data Mining» more  ICDM 2007»
15 years 9 months ago
Non-redundant Multi-view Clustering via Orthogonalization
Typical clustering algorithms output a single clustering of the data. However, in real world applications, data can often be interpreted in many different ways; data can have diff...
Ying Cui, Xiaoli Z. Fern, Jennifer G. Dy
ALT
2007
Springer
15 years 9 months ago
On Universal Transfer Learning
In transfer learning the aim is to solve new learning tasks using fewer examples by using information gained from solving related tasks. Existing transfer learning methods have be...
M. M. Hassan Mahmud
111
Voted
BTW
2007
Springer
100views Database» more  BTW 2007»
15 years 9 months ago
On Deriving Net Change Information From Change Logs - The DELTALAYER-Algorithm
: The management of change logs is crucial in different areas of information systems like data replication, data warehousing, and process management. One barrier that hampers the (...
Stefanie Rinderle, Martin Jurisch, Manfred Reicher...
« Prev « First page 2272 / 2452 Last » Next »