Sciweavers

1364 search results - page 72 / 273
» Data Level Inference Detection in Database Systems
Sort
View
87
Voted
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 4 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
85
Voted
VLDB
2004
ACM
105views Database» more  VLDB 2004»
15 years 6 months ago
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, fina...
Richard T. Snodgrass, Shilong (Stanley) Yao, Chris...
DEXA
1997
Springer
101views Database» more  DEXA 1997»
15 years 4 months ago
A Meta Message Approach for Electronic Data Interchange (EDI)
Still most of the current information systems are intra-organizational. Since products, services and production processes have become more information intensive, there is an increa...
Christian Huemer, Gerald Quirchmayr, A. Min Tjoa
ACSAC
2004
IEEE
15 years 4 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
POPL
2000
ACM
15 years 5 months ago
Type Systems for Distributed Data Structures
Distributed-memory programs are often written using a global address space: any process can name any memory location on any processor. Some languages completely hide the distincti...
Ben Liblit, Alexander Aiken