Sciweavers

24188 search results - page 391 / 4838
» Computing on Encrypted Data
Sort
View
TEC
2002
89views more  TEC 2002»
15 years 4 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
148
Voted
IEAAIE
2010
Springer
15 years 2 months ago
A Study of Detecting Computer Viruses in Real-Infected Files in the n-Gram Representation with Machine Learning Methods
Abstract. Machine learning methods were successfully applied in recent years for detecting new and unseen computer viruses. The viruses were, however, detected in small virus loade...
Thomas Stibor
JCNS
2010
103views more  JCNS 2010»
14 years 11 months ago
Efficient computation of the maximum a posteriori path and parameter estimation in integrate-and-fire and more general state-spa
A number of important data analysis problems in neuroscience can be solved using state-space models. In this article, we describe fast methods for computing the exact maximum a pos...
Shinsuke Koyama, Liam Paninski
DCC
2006
IEEE
16 years 4 months ago
Compressed Data Structures: Dictionaries and Data-Aware Measures
Abstract. We propose measures for compressed data structures, in which space usage is measured in a data-aware manner. In particular, we consider the fundamental dictionary problem...
Ankur Gupta, Wing-Kai Hon, Rahul Shah, Jeffrey Sco...
RSFDGRC
2005
Springer
134views Data Mining» more  RSFDGRC 2005»
15 years 10 months ago
The Computational Complexity of Inference Using Rough Set Flow Graphs
Pawlak recently introduced rough set flow graphs (RSFGs) as a graphical framework for reasoning from data. Each rule is associated with three coefficients, which have been shown t...
Cory J. Butz, Wen Yan, Boting Yang