Sciweavers

587 search results - page 67 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 10 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
14 years 10 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
KDD
2006
ACM
162views Data Mining» more  KDD 2006»
14 years 10 months ago
Simultaneous record detection and attribute labeling in web data extraction
Recent work has shown the feasibility and promise of templateindependent Web data extraction. However, existing approaches use decoupled strategies ? attempting to do data record ...
Jun Zhu, Zaiqing Nie, Ji-Rong Wen, Bo Zhang, Wei-Y...
FLAIRS
2003
13 years 11 months ago
Bayesian Classification of Triage Diagnoses for the Early Detection of Epidemics
The distribution of illnesses reported by emergency departments from hospitals in a region under surveillance is particularly informative for the early detection of epidemics. The...
Robert T. Olszewski
ISSTA
2012
ACM
12 years 21 days ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...