Sciweavers

43264 search results - page 8354 / 8653
» Comparing models of computation
Sort
View
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
15 years 11 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
KDD
2004
ACM
108views Data Mining» more  KDD 2004»
15 years 11 months ago
Sleeved coclustering
A coCluster of a m?n matrix X is a submatrix determined by a subset of the rows and a subset of the columns. The problem of finding coClusters with specific properties is of inter...
Avraham A. Melkman, Eran Shaham
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
15 years 11 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel
86
Voted
KDD
2001
ACM
118views Data Mining» more  KDD 2001»
15 years 11 months ago
Infominer: mining surprising periodic patterns
In this paper, we focus on mining surprising periodic patterns in a sequence of events. In many applications, e.g., computational biology, an infrequent pattern is still considere...
Jiong Yang, Wei Wang 0010, Philip S. Yu
188
Voted
POPL
2008
ACM
15 years 11 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
« Prev « First page 8354 / 8653 Last » Next »