Sciweavers

3651 search results - page 592 / 731
» Data Mining for Security Applications
Sort
View
123
Voted
CVPR
2012
IEEE
13 years 3 months ago
Max-margin early event detectors
The need for early detection of temporal events from sequential data arises in a wide spectrum of applications ranging from human-robot interaction to video security. While tempor...
Minh Hoai Nguyen, Fernando De la Torre
87
Voted
JWSR
2007
129views more  JWSR 2007»
15 years 21 days ago
Extensible Architecture for High-Performance, Scalable, Reliable Publish-Subscribe Eventing and Notification
Existing Web service notification and eventing standards are useful in many applications, but they have serious limitations that make them ill-suited for large-scale deployments, ...
Krzysztof Ostrowski, Ken Birman, Danny Dolev
EDBT
2010
ACM
181views Database» more  EDBT 2010»
14 years 11 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
136
Voted
CCS
2010
ACM
15 years 1 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
PDPTA
2008
15 years 2 months ago
A GridFTP Transport Driver for Globus XIO
GridFTP is a high-performance, reliable data transfer protocol optimized for high-bandwidth wide-area networks. Based on the Internet FTP protocol, it defines extensions for highp...
Rajkumar Kettimuthu, Wantao Liu, Joseph M. Link, J...