Sciweavers

3651 search results - page 47 / 731
» Data Mining for Security Applications
Sort
View
USENIX
2007
15 years 2 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
95
Voted
GIS
2010
ACM
14 years 10 months ago
A data stream-based evaluation framework for traffic information systems
Traffic information systems based on mobile, in-car sensor technology are a challenge for data management systems as a huge amount of data has to be processed in real-time. Data m...
Sandra Geisler, Christoph Quix, Stefan Schiffer
107
Voted
DAWAK
2003
Springer
15 years 5 months ago
Performance Tests in Data Warehousing ETLM Process for Detection of Changes in Data Origin
In a data warehouse (DW) environment, when the operational environment does not posses or does not want to inform the data about the changes that occurred, controls have to be impl...
Rosana L. de B. A. Rocha, Leonardo Figueiredo Card...
SIGMOD
2005
ACM
161views Database» more  SIGMOD 2005»
16 years 20 days ago
Building data mining solutions with OLE DB for DM and XML for analysis
A data mining component is included in Microsoft SQL Server 2000 and SQL Server 2005, one of the most popular DBMSs. This gives a push for data mining technologies to move from a ...
ZhaoHui Tang, Jamie Maclennan, Pyungchul (Peter) K...
117
Voted
IADIS
2008
15 years 1 months ago
Data Mining In Non-Stationary Multidimensional Time Series Using A Rule Similarity Measure
Time series analysis is a wide area of knowledge that studies processes in their evolution. The classical research in the area tends to find global laws underlying the behaviour o...
Nikolay V. Filipenkov