Sciweavers

557 search results - page 66 / 112
» Two experiences designing for effective security
Sort
View
AINA
2004
IEEE
15 years 3 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
BMCBI
2006
131views more  BMCBI 2006»
14 years 12 months ago
SIMAGE: simulation of DNA-microarray gene expression data
Background: Simulation of DNA-microarray data serves at least three purposes: (i) optimizing the design of an intended DNA microarray experiment, (ii) comparing existing pre-proce...
Casper J. Albers, Ritsert C. Jansen, Jan Kok, Osca...
BPM
2006
Springer
166views Business» more  BPM 2006»
15 years 3 months ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
EUROSYS
2008
ACM
15 years 9 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
MICRO
1995
IEEE
102views Hardware» more  MICRO 1995»
15 years 3 months ago
Zero-cycle loads: microarchitecture support for reducing load latency
Untolerated load instruction latencies often have a significant impact on overall program performance. As one means of mitigating this effect, we present an aggressive hardware-b...
Todd M. Austin, Gurindar S. Sohi