Sciweavers

126 search results - page 12 / 26
» A Probabilistic Method for Detecting Anomalous Program Behav...
Sort
View
ASPLOS
2010
ACM
14 years 2 months ago
Shoestring: probabilistic soft error reliability on the cheap
Aggressive technology scaling provides designers with an ever increasing budget of cheaper and faster transistors. Unfortunately, this trend is accompanied by a decline in individ...
Shuguang Feng, Shantanu Gupta, Amin Ansari, Scott ...
ISBI
2008
IEEE
14 years 8 months ago
Learning non-homogenous textures and the unlearning problem with application to drusen detection in retinal images
In this work we present a novel approach for learning nonhomogenous textures without facing the unlearning problem. Our learning method mimics the human behavior of selective lear...
Noah Lee, Andrew F. Laine, Theodore R. Smith
DATE
2004
IEEE
158views Hardware» more  DATE 2004»
13 years 11 months ago
Communication Analysis for System-On-Chip Design
In this paper we present an approach for analysis of systems of parallel, communicating processes for SoC design. We present a method to detect communications that synchronize the...
Axel Siebenborn, Oliver Bringmann, Wolfgang Rosens...
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
11 years 9 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok