Sciweavers

1298 search results - page 99 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 8 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
134
Voted
VLDB
1994
ACM
121views Database» more  VLDB 1994»
15 years 7 months ago
The Impact of Global Clustering on Spatial Database Systems
Global clustering has rarely been investigated in the area of spatial database systems although dramatic performance improvements can be achieved by using suitable techniques. In ...
Thomas Brinkhoff, Hans-Peter Kriegel
141
Voted
ICDM
2008
IEEE
230views Data Mining» more  ICDM 2008»
15 years 10 months ago
Clustering Distributed Time Series in Sensor Networks
Event detection is a critical task in sensor networks, especially for environmental monitoring applications. Traditional solutions to event detection are based on analyzing one-sh...
Jie Yin, Mohamed Medhat Gaber
DKE
2006
83views more  DKE 2006»
15 years 3 months ago
Bulk insertion for R-trees by seeded clustering
We propose a scalable technique called Seeded Clustering that allows us to maintain R-tree indices by bulk insertion while keeping pace with high data arrival rates. Our approach ...
Taewon Lee, Bongki Moon, Sukho Lee
DAWAK
2003
Springer
15 years 8 months ago
Handling Large Workloads by Profiling and Clustering
View materialization is recognized to be one of the most effective ways to increase the Data Warehouse performance; nevertheless, due to the computational complexity of the techniq...
Matteo Golfarelli