Sciweavers

1356 search results - page 20 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 1 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
DAC
2006
ACM
14 years 8 months ago
Multiprocessor system-on-chip data reuse analysis for exploring customized memory hierarchies
The increasing use of Multiprocessor Systems-on-Chip (MPSoCs) for high performance demands of embedded applications results in high power dissipation. The memory subsystem is a la...
Ilya Issenin, Erik Brockmeyer, Bart Durinck, Nikil...
JMS
2006
90views more  JMS 2006»
13 years 7 months ago
Healthcare Informatics Research: From Data to Evidence-Based Management
Healthcare informatics research is a scientific endeavor that applies information science, computer technology, and statistical modeling techniques to develop decision support syst...
Thomas T. H. Wan
CLEF
2010
Springer
13 years 9 months ago
Bootstrapping Websites for Classification of Organization Names on Twitter
There has been a growing interest in monitoring the social media presence of companies for improved marketing. Many public APIs are available for tapping into the data, and there a...
Paul Kalmar