Sciweavers

1356 search results - page 111 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
VLDB
2007
ACM
179views Database» more  VLDB 2007»
14 years 8 months ago
Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data
Market analysis is a representative data analysis process with many applications. In such an analysis, critical numerical measures, such as profit and sales, fluctuate over time a...
Xiaolei Li, Jiawei Han
VLDB
1998
ACM
192views Database» more  VLDB 1998»
14 years 15 days ago
Algorithms for Mining Distance-Based Outliers in Large Datasets
This paper deals with finding outliers (exceptions) in large, multidimensional datasets. The identification of outliers can lead to the discovery of truly unexpected knowledge in ...
Edwin M. Knorr, Raymond T. Ng
WS
2004
ACM
14 years 1 months ago
Analysis of the 802.11i 4-way handshake
802.11i is an IEEE standard designed to provide enhanced MAC security in wireless networks. The authentication process involves three entities: the supplicant (wireless device), t...
Changhua He, John C. Mitchell
BMCBI
2010
156views more  BMCBI 2010»
13 years 8 months ago
Mathematical model for empirically optimizing large scale production of soluble protein domains
Background: Efficient dissection of large proteins into their structural domains is critical for high throughput proteome analysis. So far, no study has focused on mathematically ...
Eisuke Chikayama, Atsushi Kurotani, Takanori Tanak...
IV
2009
IEEE
141views Visualization» more  IV 2009»
14 years 2 months ago
VioNeS - Visual Support for the Analysis of the Next Sub-volume Method
Computational simulation is an established method to gain insight into cellular processes. As the resulting data sets are usually large and complex, visualization can play a signi...
Andrea Unger, Enrico Gutzeit, Matthias Jeschke, He...