Sciweavers

839 search results - page 152 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
114
Voted
DASC
2006
IEEE
15 years 4 months ago
Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring
Run-time monitoring is a powerful approach for dynamically detecting faults or malicious activity of software systems. However, there are often two obstacles to the implementation...
Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Joh...
120
Voted
KDD
2002
ACM
164views Data Mining» more  KDD 2002»
16 years 1 months ago
Meta-classification: Combining Multimodal Classifiers
Combining multiple classifiers is of particular interest in multimedia applications. Each modality in multimedia data can be analyzed individually, and combining multiple pieces of...
Wei-Hao Lin, Alexander G. Hauptmann
130
Voted
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
15 years 5 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
108
Voted
OSDI
2008
ACM
16 years 1 months ago
On the Impact of Disk Scrubbing on Energy Savings
The increasing use of computers for saving valuable data imposes stringent reliability constraints on storage systems. Reliability improvement via use of redundancy is a common pr...
Guanying Wang, Ali Raza Butt, Chris Gniady
108
Voted
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
15 years 6 months ago
The Illusion of Effective Management Information: A Critical Perspective
The availability of effective management information is essential when coping with today’s complexity and dynamism, both within and around organizations. Information technology ...
Fred A. B. Lohman, Henk G. Sol, Gert-Jan de Vreede