Sciweavers

2049 search results - page 333 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
15 years 11 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
70
Voted
ICSE
2004
IEEE-ACM
15 years 11 months ago
An Empirical Study of Software Reuse vs. Defect-Density and Stability
The paper describes results of an empirical study, where some hypotheses about the impact of reuse on defect-density and stability, and about the impact of component size on defec...
Parastoo Mohagheghi, Reidar Conradi, Ole M. Killi,...
SSD
2007
Springer
133views Database» more  SSD 2007»
15 years 5 months ago
Compression of Digital Road Networks
Abstract. In the consumer market, there has been an increasing interest in portable navigation systems in the last few years. These systems usually work on digital map databases st...
Jonghyun Suh, Sungwon Jung, Martin Pfeifle, Khoa T...
IDEAS
2003
IEEE
102views Database» more  IDEAS 2003»
15 years 4 months ago
Pushing Quality of Service Information and Requirements into Global Query Optimization
In recent years, a lot of research effort has been dedicated to the management of Quality of Service (QoS), mainly in the fields of telecommunication networks and multimedia syste...
Haiwei Ye, Brigitte Kerhervé, Gregor von Bo...
DEXA
2007
Springer
154views Database» more  DEXA 2007»
15 years 5 months ago
Performance Oriented Schema Matching
Abstract. Semantic matching of schemas in heterogeneous data sharing systems is time consuming and error prone. Existing mapping tools employ semi-automatic techniques for mapping ...
Khalid Saleem, Zohra Bellahsene, Ela Hunt