Sciweavers

435 search results - page 63 / 87
» Approaches to Constructing a Stratified Merged Knowledge Bas...
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
SDM
2010
SIAM
156views Data Mining» more  SDM 2010»
13 years 9 months ago
Unsupervised Discovery of Abnormal Activity Occurrences in Multi-dimensional Time Series, with Applications in Wearable Systems
We present a method for unsupervised discovery of abnormal occurrences of activities in multi-dimensional time series data. Unsupervised activity discovery approaches differ from ...
Alireza Vahdatpour, Majid Sarrafzadeh
DLOG
2008
13 years 10 months ago
Taming the Infinite Chase: Query Answering under Expressive Relational Constraints
Answering queries posed over knowledge bases is a central problem in knowledge representation and database theory. In databases, query containment is one of the important query op...
Andrea Calì, Georg Gottlob, Michael Kifer
ECML
2007
Springer
14 years 1 months ago
Exploiting Term, Predicate, and Feature Taxonomies in Propositionalization and Propositional Rule Learning
Knowledge representations using semantic web technologies often provide information which translates to explicit term and predicate taxonomies in relational learning. We show how t...
Monika Záková, Filip Zelezný
IDA
2003
Springer
14 years 27 days ago
Large Scale Mining of Molecular Fragments with Wildcards
The main task of drug discovery is to find novel bioactive molecules, i.e., chemical compounds that, for example, protect human cells against a virus. One way to support solving t...
Heiko Hofer, Christian Borgelt, Michael R. Berthol...