Sciweavers

518 search results - page 90 / 104
» Analysis of sampling techniques for association rule mining
Sort
View
ICDE
2009
IEEE
1081views Database» more  ICDE 2009»
15 years 6 months ago
Modeling and Integrating Background Knowledge in Data Anonymization
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult for the d...
Tiancheng Li, Ninghui Li, Jian Zhang
GI
2009
Springer
13 years 4 months ago
Modelling Missing Values for Audience Measurement in Outdoor Advertising Using GPS Data
Abstract: GPS technology has made it possible to evaluate the performance of outdoor advertising campaigns in an objective manner. Given the GPS trajectories of a sample of test pe...
Michael May, Christine Körner, Dirk Hecker, M...
WWW
2011
ACM
13 years 1 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
USENIX
2007
13 years 9 months ago
Dynamic Spyware Analysis
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
SIGITE
2005
ACM
14 years 8 days ago
A cross-collegiate analysis of software development course content
Many undergraduate IT programs recognize that their graduates will find jobs as software developers. As such, software development (analysis and design) courses are often a core r...
Timothy Burns, Robb Klashner