Sciweavers

1364 search results - page 114 / 273
» Data Level Inference Detection in Database Systems
Sort
View
142
Voted
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
16 years 1 months ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill
115
Voted
RAID
2001
Springer
15 years 5 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
114
Voted
ERLANG
2007
ACM
15 years 5 months ago
A language for specifying type contracts in Erlang and its interaction with success typings
We propose a small extension of the ERLANG language that allows programmers to specify contracts with type information at the level of individual functions. Such contracts are opt...
Miguel Jimenez, Tobias Lindahl, Konstantinos F. Sa...
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 1 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
144
Voted
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
14 years 11 months ago
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Public data sharing is utilized in a number of businesses to facilitate the exchange of information. Privacy constraints are usually enforced to prevent unwanted inference of info...
Rinku Dewri, Darrell Whitley, Indrajit Ray, Indrak...