Sciweavers

398 search results - page 56 / 80
» Mining System Audit Data: Opportunities and Challenges
Sort
View
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 7 months ago
Analyzing Abnormal Events from Spatio-temporal Trajectories
Advances in RFID based sensor technologies has been used in applications which requires the tracking of assets, products and individuals. The recording of such movements is capture...
Dhaval Patel, Chidansh Bhatt, Wynne Hsu, Mong-Li L...
LCPC
2005
Springer
15 years 3 months ago
Code Transformations for One-Pass Analysis
With the growing popularity of streaming data model, processing queries over streaming data has become an important topic. Streaming data has received attention in a number of comm...
Xiaogang Li, Gagan Agrawal
IJCAI
2003
14 years 11 months ago
Intelligent Techniques for Web Personalization
In this chapter we provide a comprehensive overview of the topic of Intelligent Techniques for Web Personalization. Web Personalization is viewed as an application of data mining a...
Sarabjot S. Anand, Bamshad Mobasher
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 2 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
GRID
2008
Springer
14 years 9 months ago
Cost and accuracy sensitive dynamic workflow composition over grid environments
A myriad of recent activities can be seen towards dynamic workflow composition for processing complex and data intensive problems. Meanwhile, the simultaneous emergence of the gri...
David Chiu, Sagar Deshpande, Gagan Agrawal, Rongxi...