Sciweavers

953 search results - page 84 / 191
» INEX 2007 Evaluation Measures
Sort
View
ICDM
2007
IEEE
199views Data Mining» more  ICDM 2007»
15 years 8 months ago
Discovering Structural Anomalies in Graph-Based Data
The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly det...
William Eberle, Lawrence B. Holder
QEST
2007
IEEE
15 years 8 months ago
Performance Trees: Expressiveness and Quantitative Semantics
—Performance Trees are a recently-proposed mechanism for the specification of performance properties and measures. They represent an attractive alternative to stochastic logics,...
Tamas Suto, Jeremy T. Bradley, William J. Knottenb...
CCS
2007
ACM
15 years 8 months ago
Effect of static analysis tools on software security: preliminary investigation
Static analysis tools can handle large-scale software and find thousands of defects. But do they improve software security? We evaluate the effect of static analysis tool use on s...
Vadim Okun, William F. Guthrie, Romain Gaucher, Pa...
DEXA
2007
Springer
140views Database» more  DEXA 2007»
15 years 8 months ago
Clustering-Based K-Anonymisation Algorithms
Abstract. K-anonymisation is an approach to protecting private information contained within a dataset. Many k-anonymisation methods have been proposed recently and one class of suc...
Grigorios Loukides, Jianhua Shao
IPSN
2007
Springer
15 years 8 months ago
Improving wireless simulation through noise modeling
We propose modeling environmental noise in order to efficiently and accurately simulate wireless packet delivery. We measure noise traces in many different environments and propo...
HyungJune Lee, Alberto Cerpa, Philip Levis