Sciweavers

1298 search results - page 210 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
162
Voted
VISSYM
2003
15 years 4 months ago
Visual Hierarchical Dimension Reduction for Exploration of High Dimensional Datasets
Traditional visualization techniques for multidimensional data sets, such as parallel coordinates, glyphs, and scatterplot matrices, do not scale well to high numbers of dimension...
Jing Yang, Matthew O. Ward, Elke A. Rundensteiner,...
119
Voted
ICRA
2007
IEEE
151views Robotics» more  ICRA 2007»
15 years 9 months ago
Sensor Analysis for Fault Detection in Tightly-Coupled Multi-Robot Team Tasks
— This paper presents a sensor analysis based fault detection approach (which we call SAFDetection) that is used to monitor tightly-coupled multi-robot team tasks. Our approach a...
Xingyan Li, Lynne E. Parker
ENGL
2007
101views more  ENGL 2007»
15 years 3 months ago
Multiresolution Knowledge Mining using Wavelet Transform
— Most research in Knowledge Mining deal with the basic models like clustering, classification, regression, association rule mining and so on. In the process of quest for knowled...
R. Pradeep Kumar, P. Nagabhushan
SIGSOFT
2003
ACM
16 years 4 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
VLDB
2005
ACM
93views Database» more  VLDB 2005»
15 years 8 months ago
Indexing Mixed Types for Approximate Retrieval
In various applications such as data cleansing, being able to retrieve categorical or numerical attributes based on notions of approximate match (e.g., edit distance, numerical di...
Liang Jin, Nick Koudas, Chen Li, Anthony K. H. Tun...