Sciweavers

1298 search results - page 150 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
145
Voted
MICRO
2003
IEEE
148views Hardware» more  MICRO 2003»
15 years 8 months ago
Fast Secure Processor for Inhibiting Software Piracy and Tampering
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems. For stand-alone computers, a key observation...
Jun Yang 0002, Youtao Zhang, Lan Gao
140
Voted
NIPS
2003
15 years 5 months ago
Computing Gaussian Mixture Models with EM Using Equivalence Constraints
Density estimation with Gaussian Mixture Models is a popular generative technique used also for clustering. We develop a framework to incorporate side information in the form of e...
Noam Shental, Aharon Bar-Hillel, Tomer Hertz, Daph...
168
Voted
ICDIM
2010
IEEE
15 years 1 months ago
Data mining and automatic OLAP schema generation
Data mining aims at extraction of previously unidentified information from large databases. It can be viewed as an automated application of algorithms to discover hidden patterns a...
Muhammad Usman, Sohail Asghar, Simon Fong
RAID
2007
Springer
15 years 9 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
122
Voted
AIIA
2009
Springer
15 years 10 months ago
Ontology-Driven Co-clustering of Gene Expression Data
Abstract. The huge volume of gene expression data produced by microarrays and other high-throughput techniques has encouraged the development of new computational techniques to eva...
Francesca Cordero, Ruggero G. Pensa, Alessia Visco...