Sciweavers

480 search results - page 65 / 96
» A practical bottleneck detection method
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
AUSDM
2008
Springer
221views Data Mining» more  AUSDM 2008»
13 years 11 months ago
Mining Medical Specialist Billing Patterns for Health Service Management
This paper presents an application of association rule mining in compliance in the context of health service management. There are approximately 500 million transactions processed...
Yin Shan, David Jeacocke, D. Wayne Murray, Alison ...
CVPR
1997
IEEE
14 years 11 months ago
Shape Indexing Using Approximate Nearest-Neighbour Search in High-Dimensional Spaces
Shape indexing is a way of making rapid associations between features detected in an image and object models that could have produced them. When model databases are large, the use...
Jeffrey S. Beis, David G. Lowe
SIGMOD
2005
ACM
150views Database» more  SIGMOD 2005»
14 years 9 months ago
BRAID: Stream Mining through Group Lag Correlations
The goal is to monitor multiple numerical streams, and determine which pairs are correlated with lags, as well as the value of each such lag. Lag correlations (and anticorrelation...
Yasushi Sakurai, Spiros Papadimitriou, Christos Fa...
ASPLOS
2010
ACM
14 years 3 months ago
A randomized scheduler with probabilistic guarantees of finding bugs
This paper presents a randomized scheduler for finding concurrency bugs. Like current stress-testing methods, it repeatedly runs a given test program with supplied inputs. Howeve...
Sebastian Burckhardt, Pravesh Kothari, Madanlal Mu...