Sciweavers

102 search results - page 15 / 21
» Privacy Aware Data Generation for Testing Database Applicati...
Sort
View
107
Voted
ACSAC
2007
IEEE
15 years 6 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
ICDM
2005
IEEE
187views Data Mining» more  ICDM 2005»
15 years 5 months ago
Parallel Algorithms for Distance-Based and Density-Based Outliers
An outlier is an observation that deviates so much from other observations as to arouse suspicion that it was generated by a different mechanism. Outlier detection has many applic...
Elio Lozano, Edgar Acuña
DCC
1995
IEEE
15 years 3 months ago
An Automatic System for Model-Based Coding of Faces
We present a fully automatic system for 2D model-based image coding of human faces for potential applications such as video telephony, database image compression, and face recogni...
Baback Moghaddam, Alex Pentland
76
Voted
ER
2007
Springer
142views Database» more  ER 2007»
15 years 5 months ago
Automatic Hidden-Web Table Interpretation by Sibling Page Comparison
The longstanding problem of automatic table interpretation still illudes us. Its solution would not only be an aid to table processing applications such as large volume table conve...
Cui Tao, David W. Embley
128
Voted
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
16 years 2 days ago
Anomaly pattern detection in categorical datasets
We propose a new method for detecting patterns of anomalies in categorical datasets. We assume that anomalies are generated by some underlying process which affects only a particu...
Kaustav Das, Jeff G. Schneider, Daniel B. Neill