Sciweavers

3651 search results - page 572 / 731
» Data Mining for Security Applications
Sort
View
CCS
2010
ACM
15 years 5 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
GIS
2003
ACM
16 years 6 months ago
Attribute space visualization of demographic change
This paper introduces an approach for closer integration of selforganizing maps into the visualization of spatio-temporal phenomena in GIS. It is proposed to provide a more explic...
André Skupin, Ron Hagelman
238
Voted
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 5 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
SIGMOD
2006
ACM
141views Database» more  SIGMOD 2006»
16 years 5 months ago
Contour map matching for event detection in sensor networks
Many sensor network applications, such as object tracking and disaster monitoring, require effective techniques for event detection. In this paper, we propose a novel event detect...
Wenwei Xue, Qiong Luo, Lei Chen 0002, Yunhao Liu
WWW
2010
ACM
16 years 4 days ago
Constructing travel itineraries from tagged geo-temporal breadcrumbs
Vacation planning is a frequent laborious task which requires skilled interaction with a multitude of resources. This paper develops an end-to-end approach for constructing intra-...
Munmun De Choudhury, Moran Feldman, Sihem Amer-Yah...