Sciweavers

1701 search results - page 172 / 341
» Providing k-anonymity in data mining
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 3 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
SAC
2008
ACM
14 years 10 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
KDD
2002
ACM
93views Data Mining» more  KDD 2002»
15 years 11 months ago
Interactive deduplication using active learning
Deduplication is a key operation in integrating data from multiple sources. The main challenge in this task is designing a function that can resolve when a pair of records refer t...
Sunita Sarawagi, Anuradha Bhamidipaty
DAWAK
2005
Springer
15 years 4 months ago
FMC: An Approach for Privacy Preserving OLAP
To preserve private information while providing thorough analysis is one of the significant issues in OLAP systems. One of the challenges in it is to prevent inferring the sensitiv...
Ming Hua, Shouzhi Zhang, Wei Wang 0009, Haofeng Zh...
MSR
2005
ACM
15 years 4 months ago
Collaboration using OSSmole: a repository of FLOSS data and analyses
This paper introduces a collaborative project OSSmole which collects, shares, and stores comparable data and analyses of free, libre and open source software (FLOSS) development f...
Megan Conklin, James Howison, Kevin Crowston