Sciweavers

1298 search results - page 204 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
ICDCSW
2005
IEEE
15 years 9 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
VLDB
2001
ACM
97views Database» more  VLDB 2001»
15 years 7 months ago
Functional Properties of Information Filtering
In recent years, due to the increasing popularization of data broadcasting, the volume and variety of data being broadcast are rapidly increasing. In this environment, as it is di...
Rie Sawai, Masahiko Tsukamoto, Yin-Huei Loh, Tsuto...
150
Voted
CLUSTER
2010
IEEE
14 years 7 months ago
Middleware support for many-task computing
Many-task computing aims to bridge the gap between two computing paradigms, high throughput computing and high performance computing. Many-task computing denotes highperformance co...
Ioan Raicu, Ian T. Foster, Mike Wilde, Zhao Zhang,...
CEC
2010
IEEE
15 years 4 months ago
A novel framework to elucidate core classes in a dataset
In this paper we present an original framework to extract representative groups from a dataset, and we validate it over a novel case study. The framework specifies the application ...
Daniele Soria, Jonathan M. Garibaldi
KDD
2000
ACM
97views Data Mining» more  KDD 2000»
15 years 7 months ago
Towards an effective cooperation of the user and the computer for classification
Decision trees have been successfully used for the task of classification. However, state-of-the-art algorithms do not incorporate the user in the tree construction process. This ...
Mihael Ankerst, Martin Ester, Hans-Peter Kriegel