Sciweavers

5388 search results - page 998 / 1078
» The Active Elastic Model
Sort
View
102
Voted
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 1 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 1 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
209
Voted
POPL
2008
ACM
16 years 1 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk
RECOMB
2003
Springer
16 years 1 months ago
Phylogenetically and spatially conserved word pairs associated with gene expression changes in yeasts
Background: Transcriptional regulation in eukaryotes often involves multiple transcription factors binding to the same transcription control region, and to understand the regulato...
Derek Y. Chiang, Alan M. Moses, Manolis Kamvysseli...
SIGMOD
2007
ACM
192views Database» more  SIGMOD 2007»
16 years 25 days ago
Benchmarking declarative approximate selection predicates
Declarative data quality has been an active research topic. The fundamental principle behind a declarative approach to data quality is the use of declarative statements to realize...
Amit Chandel, Oktie Hassanzadeh, Nick Koudas, Moha...