Sciweavers

6318 search results - page 75 / 1264
» Data Leakage Detection
Sort
View
IJNSEC
2010
112views more  IJNSEC 2010»
14 years 8 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
PAKDD
2009
ACM
103views Data Mining» more  PAKDD 2009»
15 years 8 months ago
Hot Item Detection in Uncertain Data
Abstract. An object o of a database D is called a hot item, if there is a sufficiently large population of other objects in D that are similar to o. In other words, hot items are ...
Thomas Bernecker, Hans-Peter Kriegel, Matthias Ren...
TITB
2010
104views Education» more  TITB 2010»
14 years 8 months ago
Time-frequency analysis of accelerometry data for detection of myoclonic seizures
Four time-frequency and time-scale methods are studied for their ability of detecting myoclonic seizures from accelerometric data. Methods that are used are: the short-time Fourier...
Tamara M. E. Nijsen, Ronald M. Aarts, Pierre J. M....
WAIM
2009
Springer
15 years 6 months ago
Intervention Events Detection and Prediction in Data Streams
Abstract. Mining interesting patterns in data streams has attracted special attention recently. This study revealed the principles behind observations, through variation of interve...
Yue Wang, Changjie Tang, Chuan Li, Yu Chen, Ning Y...
118
Voted
RV
2010
Springer
152views Hardware» more  RV 2010»
14 years 11 months ago
Efficient Data Race Detection for Async-Finish Parallelism
One of the major productivity hurdles for parallel programming is non-determinism -- a parallel program may yield different results on different executions with the same input, dep...
Raghavan Raman, Jisheng Zhao, Vivek Sarkar, Martin...