Sciweavers

1298 search results - page 151 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
128
Voted
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 23 days ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
130
Voted
KDD
2002
ACM
154views Data Mining» more  KDD 2002»
16 years 4 months ago
Mining Protein Contact Maps
The 3D conformation of a protein may be compactly represented in a symmetrical, square, boolean matrix of pairwise, inter-residue contacts, or "contact map". The contact...
Jingjing Hu, Xiaolan Shen, Yu Shao, Chris Bystroff...
146
Voted
CCGRID
2006
IEEE
15 years 9 months ago
SAHA: A Scheduling Algorithm for Security-Sensitive Jobs on Data Grids
Security-sensitive applications that access and generate large data sets are emerging in various areas such as bioinformatics and high energy physics. Data grids provide data-inte...
Tao Xie 0004, Xiao Qin
168
Voted
ICAC
2005
IEEE
15 years 9 months ago
Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters
This paper introduces a self-configuring architecture for scaling the database tier of dynamic content web servers. We use a unified approach to load and fault management based ...
Gokul Soundararajan, Kaloian Manassiev, Jin Chen, ...
VDA
2010
185views Visualization» more  VDA 2010»
15 years 6 months ago
Visualizing multidimensional data through granularity-dependent spatialization
Spatialization is a special kind of visualization that projects multidimensional data into low-dimensional representational spaces by making use of spatial metaphors. Spatializati...
Sofia Kontaxaki, Eleni Tomai, Margarita Kokla, Mar...