Sciweavers

839 search results - page 51 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
IPPS
2006
IEEE
15 years 6 months ago
An entropy-based algorithm for time-driven software instrumentation in parallel systems
While monitoring, instrumented long running parallel applications generate huge amount of instrumentation data. Processing and storing this data incurs overhead, and perturbs the ...
A. Ozmen
110
Voted
AIPR
2003
IEEE
15 years 4 months ago
Sensor and Classifier Fusion for Outdoor Obstacle Detection: an Application of Data Fusion To Autonomous Off-Road Navigation
This paper describes an approach for using several levels of data fusion in the domain of autonomous off-road navigation. We are focusing on outdoor obstacle detection, and we pre...
Cristian Dima, Nicolas Vandapel, Martial Hebert
107
Voted
DAC
2001
ACM
16 years 1 months ago
Detection of Partially Simultaneously Alive Signals in Storage Requirement Estimation for Data Intensive Applications
In this paper, we propose a novel storage requirement estimation methodology for use in the early system design phases when the data transfer ordering is only partially fixed. At ...
Per Gunnar Kjeldsberg, Francky Catthoor, Einar J. ...
144
Voted
SAC
2008
ACM
15 years 16 hour ago
Frequent pattern mining for kernel trace data
Operating systems engineers have developed tracing tools that log details about process execution at the kernel level. These tools make it easier to understand the actual executio...
Christopher LaRosa, Li Xiong, Ken Mandelberg
95
Voted
WWW
2007
ACM
16 years 1 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi