Sciweavers

839 search results - page 123 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
108
Voted
VLDB
1998
ACM
105views Database» more  VLDB 1998»
15 years 5 months ago
Computing Iceberg Queries Efficiently
Many applications compute aggregate functions over an attribute (or set of attributes) to find aggregate values above some specified threshold. We call such queries iceberg querie...
Min Fang, Narayanan Shivakumar, Hector Garcia-Moli...
134
Voted
TITS
2011
165views more  TITS 2011»
14 years 7 months ago
Robust Inference of Principal Road Paths for Intelligent Transportation Systems
Abstract—Over the last few years, electronic vehicle guidance systems have become increasingly more popular. However, despite their ubiquity, performance will always be subject t...
Gabriel Agamennoni, Juan Nieto, Eduardo Mario Nebo...
141
Voted
BMCBI
2006
166views more  BMCBI 2006»
15 years 24 days ago
bioNMF: a versatile tool for non-negative matrix factorization in biology
Background: In the Bioinformatics field, a great deal of interest has been given to Non-negative matrix factorization technique (NMF), due to its capability of providing new insig...
Alberto D. Pascual-Montano, Pedro Carmona-Saez, Mo...
119
Voted
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
15 years 6 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl
NDSS
2008
IEEE
15 years 7 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...