Sciweavers

839 search results - page 86 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
PERVASIVE
2004
Springer
15 years 6 months ago
Context Cube: Flexible and Effective Manipulation of Sensed Context Data
In an effort to support the development of context-aware applications that use archived sensor data, we introduce the concept of the Context Cube based on techniques of data wareho...
Lonnie D. Harvel, Ling Liu, Gregory D. Abowd, Yu-X...
IPPS
2009
IEEE
15 years 7 months ago
Using hardware transactional memory for data race detection
Abstract—Widespread emergence of multicore processors will spur development of parallel applications, exposing programmers to degrees of hardware concurrency hitherto unavailable...
Shantanu Gupta, Florin Sultan, Srihari Cadambi, Fr...
116
Voted
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
16 years 1 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov
108
Voted
IDA
2005
Springer
15 years 6 months ago
Pulse: Mining Customer Opinions from Free Text
Abstract. We present a prototype system, code-named Pulse, for mining topics and sentiment orientation jointly from free text customer feedback. We describe the application of the ...
Michael Gamon, Anthony Aue, Simon Corston-Oliver, ...
VIZSEC
2005
Springer
15 years 6 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...