Sciweavers

76 search results - page 15 / 16
» An Observation-Centric Analysis on the Modeling of Anomaly-b...
Sort
View
VLDB
2004
ACM
100views Database» more  VLDB 2004»
14 years 1 months ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
MMSP
2008
IEEE
184views Multimedia» more  MMSP 2008»
14 years 2 months ago
When multimedia advertising meets the new Internet era
—The advent of media-sharing sites, especially along with the so called Web 2.0 wave, has led to the unprecedented Internet delivery of community-contributed media contents such ...
Xian-Sheng Hua, Tao Mei, Shipeng Li
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
GD
2008
Springer
13 years 8 months ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
DATAMINE
2008
143views more  DATAMINE 2008»
13 years 7 months ago
Automatically countering imbalance and its empirical relationship to cost
Learning from imbalanced datasets presents a convoluted problem both from the modeling and cost standpoints. In particular, when a class is of great interest but occurs relatively...
Nitesh V. Chawla, David A. Cieslak, Lawrence O. Ha...