Sciweavers

264 search results - page 28 / 53
» View security as the basis for data warehouse security
Sort
View
WISTP
2010
Springer
15 years 6 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
14 years 11 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...
HICSS
2003
IEEE
101views Biometrics» more  HICSS 2003»
15 years 5 months ago
Displaying Aggregate Data, Interrelated Quantities, and Data Trends in Electric Power Systems
This paper describes a number of effective techniques for visualizing some of the more complex data relationships that characterize an electric power system in real time. Power sy...
Ray Klump, Warren Wu, Greg Dooley
ISI
2008
Springer
14 years 11 months ago
Towards service-oriented continuous queries in pervasive systems
Pervasive information systems give an overview of what digital environments should look like in the future. From a data-centric point of view, traditional databases have to be used...
Yann Gripay, Frédérique Laforest, Je...
ISI
2007
Springer
15 years 5 months ago
DOTS: Detection of Off-Topic Search via Result Clustering
— Often document dissemination is limited to a “need to know” basis so as to better maintain organizational trade secrets. Retrieving documents that are off-topic to a user...
Nazli Goharian, Alana Platt