Sciweavers

1356 search results - page 68 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
KDD
2006
ACM
149views Data Mining» more  KDD 2006»
14 years 8 months ago
Regularized discriminant analysis for high dimensional, low sample size data
Linear and Quadratic Discriminant Analysis have been used widely in many areas of data mining, machine learning, and bioinformatics. Friedman proposed a compromise between Linear ...
Jieping Ye, Tie Wang
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
14 years 8 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
IPSN
2005
Springer
14 years 1 months ago
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
A wireless sensor network consists of a large number of small, resource-constrained devices and usually operates in hostile environments that are prone to link and node failures. ...
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
USITS
2001
13 years 9 months ago
Measurement and Analysis of a Streaming Media Workload
The increasing availability of continuous-media data is provoking a significant change in Internet workloads. For example, video from news, sports, and entertainment sites, and au...
Maureen Chesire, Alec Wolman, Geoffrey M. Voelker,...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
14 years 5 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...