Sciweavers

253 search results - page 39 / 51
» Probabilistic Alert Correlation
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
72
Voted
ICRA
2005
IEEE
121views Robotics» more  ICRA 2005»
15 years 3 months ago
Modeling and Analysis of Beaconless and Beacon-Based Policies for a Swarm-Intelligent Inspection System
Abstract— We are developing a swarm-intelligent inspection system based on a swarm of autonomous, miniature robots, using only on-board, local sensors. To estimate intrinsic adva...
Nikolaus Correll, Alcherio Martinoli
95
Voted
GECCO
2005
Springer
134views Optimization» more  GECCO 2005»
15 years 3 months ago
Predicting mining activity with parallel genetic algorithms
We explore several different techniques in our quest to improve the overall model performance of a genetic algorithm calibrated probabilistic cellular automata. We use the Kappa ...
Sam Talaie, Ryan E. Leigh, Sushil J. Louis, Gary L...
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 3 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
VLDB
2005
ACM
121views Database» more  VLDB 2005»
15 years 3 months ago
Online Estimation For Subset-Based SQL Queries
The largest databases in use today are so large that answering a query exactly can take minutes, hours, or even days. One way to address this problem is to make use of approximati...
Chris Jermaine, Alin Dobra, Abhijit Pol, Shantanu ...