Sciweavers

2421 search results - page 245 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
KAIS
2006
77views more  KAIS 2006»
15 years 4 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...
FCCM
2000
IEEE
131views VLSI» more  FCCM 2000»
15 years 9 months ago
A Reliable LZ Data Compressor on Reconfigurable Coprocessors
Data compression techniques based on Lempel-Ziv (LZ) algorithm are widely used in a variety of applications, especially in data storage and communications. However, since the LZ a...
Wei-Je Huang, Nirmal R. Saxena, Edward J. McCluske...
EUROPAR
2004
Springer
15 years 10 months ago
Architecture-Independent Meta-optimization by Aggressive Tail Splitting
Several optimization techniques are hindered by uncertainties about the control flow in a program, which can generally not be determined by static methods at compile time. We pres...
Michael Rock, Andreas Koch
CSFW
2004
IEEE
15 years 8 months ago
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
Frédéric Cuppens, Sylvain Gombault, ...
DSS
2006
76views more  DSS 2006»
15 years 4 months ago
Mining web navigations for intelligence
The Internet is one of the fastest growing areas of intelligence gathering. We present a statistical approach, called principal clusters analysis, for analyzing millions of user n...
Harris Wu, Michael D. Gordon, Kurt DeMaagd, Weiguo...