Sciweavers

912 search results - page 137 / 183
» Anomaly
Sort
View
ACSAC
2005
IEEE
14 years 2 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ACSAC
2005
IEEE
14 years 2 months ago
Detecting Intra-enterprise Scanning Worms based on Address Resolution
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
CBMS
2005
IEEE
14 years 2 months ago
A Practical Tool for Visualizing and Data Mining Medical Time Series
The increasing interest in time series data mining has had surprisingly little impact on real world medical applications. Practitioners who work with time series on a daily basis ...
Li Wei, Nitin Kumar, Venkata Nishanth Lolla, Eamon...
CLUSTER
2005
IEEE
14 years 2 months ago
TCP Adaptation for MPI on Long-and-Fat Networks
Typical MPI applications work in phases of computation and communication, and messages are exchanged in relatively small chunks. This behavior is not optimal for TCP because TCP i...
Motohiko Matsuda, Tomohiro Kudoh, Yuetsu Kodama, R...
HICSS
2005
IEEE
175views Biometrics» more  HICSS 2005»
14 years 2 months ago
Causal Reasoning Engine: An Explanation-Based Approach to Syndromic Surveillance
1 Quickly detecting an unexpected pathogen can save many lives. In cases of bioterrorism or naturally occurring epidemics, accurate diagnoses may not be made until much of the popu...
Benjamin B. Perry, Tim Van Allen