Sciweavers

11172 search results - page 2112 / 2235
» Testing Physical Systems
Sort
View
135
Voted
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 4 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
142
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 4 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
123
Voted
RECOMB
2002
Springer
16 years 4 months ago
String barcoding: uncovering optimal virus signatures
There are many critical situations when one needs to rapidly identify an unidentified pathogen from among a given set of previously sequenced pathogens. DNA or RNA hybridization c...
Sam Rash, Dan Gusfield
163
Voted
SIGMOD
2004
ACM
165views Database» more  SIGMOD 2004»
16 years 3 months ago
Industrial-Strength Schema Matching
Schema matching identifies elements of two given schemas that correspond to each other. Although there are many algorithms for schema matching, little has been written about build...
Philip A. Bernstein, Sergey Melnik, Michalis Petro...
134
Voted
EDBT
2008
ACM
147views Database» more  EDBT 2008»
16 years 3 months ago
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
In this demonstration, we present the design and features of iDataGuard. iDataGuard is an interoperable security middleware that allows users to outsource their file systems to he...
Ravi Chandra Jammalamadaka, Roberto Gamboni, Shara...
« Prev « First page 2112 / 2235 Last » Next »