Sciweavers

103 search results - page 15 / 21
» Constructing malware normalizers using term rewriting
Sort
View
IMC
2010
ACM
14 years 9 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
MOBISYS
2007
ACM
15 years 11 months ago
Algorithm to automatically detect abnormally long periods of inactivity in a home
An algorithm has been developed to automatically construct individual models of normal activity within a home using motion sensor data. Alerts can be generated when a period of in...
Paul Cuddihy, Jenny Weisenberg, Catherine Graichen...
KDD
2004
ACM
192views Data Mining» more  KDD 2004»
16 years 1 days ago
Mining and summarizing customer reviews
Merchants selling products on the Web often ask their customers to review the products that they have purchased and the associated services. As e-commerce is becoming more and mor...
Minqing Hu, Bing Liu
MMB
2004
Springer
175views Communications» more  MMB 2004»
15 years 5 months ago
Sensitivity Analysis for MAP/MAP/1 Queues
A sensitivity analysis of a single-server, infinite-buffer queue with correlated arrivals and correlated service times is performed. We study and compare the isolated impact of (...
Armin Heindl
ICFP
2009
ACM
16 years 9 days ago
Causal commutative arrows and their optimization
re a popular form of abstract computation. Being more general than monads, they are more broadly applicable, and in parare a good abstraction for signal processing and dataflow co...
Hai Liu, Eric Cheng, Paul Hudak