Sciweavers

620 search results - page 80 / 124
» Methods and Practical Issues in Evaluating Alignment Techniq...
Sort
View
ISICA
2009
Springer
15 years 8 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 5 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...
JLP
2006
111views more  JLP 2006»
15 years 1 months ago
Executable structural operational semantics in Maude
This paper describes in detail how to bridge the gap between theory and practice when implementing in Maude structural operational semantics described in rewriting logic, where tr...
Alberto Verdejo, Narciso Martí-Oliet
DIS
2009
Springer
15 years 8 months ago
Using Data Mining for Wine Quality Assessment
Certification and quality assessment are crucial issues within the wine industry. Currently, wine quality is mostly assessed by physicochemical (e.g alcohol levels) and sensory (e...
Paulo Cortez, Juliana Teixeira, António Cer...
PG
2007
IEEE
15 years 7 months ago
Genus Oblivious Cross Parameterization: Robust Topological Management of Inter-Surface Maps
We consider the problem of generating a map between two triangulated meshes, M and M’, with arbitrary and possibly differing genus. This problem has rarely been tackled in its g...
Janine Bennett, Valerio Pascucci, Kenneth I. Joy