Sciweavers

62 search results - page 8 / 13
» An Empirical Evaluation of Three Defect-Detection Techniques
Sort
View
IJNSEC
2007
119views more  IJNSEC 2007»
13 years 7 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
FAST
2011
12 years 11 months ago
Reliably Erasing Data from Flash-Based Solid State Drives
Reliably erasing data from storage media (sanitizing the media) is a critical component of secure data management. While sanitizing entire disks and individual files is well-unde...
Michael Yung Chung Wei, Laura M. Grupp, Frederick ...
CP
2007
Springer
14 years 1 months ago
: The Design and Analysis of an Algorithm Portfolio for SAT
It has been widely observed that there is no “dominant” SAT solver; instead, different solvers perform best on different instances. Rather than following the traditional appr...
Lin Xu, Frank Hutter, Holger H. Hoos, Kevin Leyton...
ICDM
2003
IEEE
99views Data Mining» more  ICDM 2003»
14 years 23 days ago
Simple Estimators for Relational Bayesian Classifiers
In this paper we present the Relational Bayesian Classifier (RBC), a modification of the Simple Bayesian Classifier (SBC) for relational data. There exist several Bayesian classif...
Jennifer Neville, David Jensen, Brian Gallagher
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
13 years 11 months ago
Large Datasets Lead to Overly Complex Models: An Explanation and a Solution
This paper explores unexpected results that lie at the intersection of two common themes in the KDD community: large datasets and the goal of building compact models. Experiments ...
Tim Oates, David Jensen