Sciweavers

1290 search results - page 164 / 258
» Data Dependence Testing in Practice
Sort
View
ML
2008
ACM
13 years 10 months ago
Discovering significant patterns
Pattern discovery techniques, such as association rule discovery, explore large search spaces of potential patterns to find those that satisfy some user-specified constraints. Due...
Geoffrey I. Webb
ACMMSP
2006
ACM
226views Hardware» more  ACMMSP 2006»
14 years 1 months ago
Smarter garbage collection with simplifiers
We introduce a method for providing lightweight daemons, called simplifiers, that attach themselves to program data. If a data item has a simplifier, the simplifier may be run aut...
Melissa E. O'Neill, F. Warren Burton
KDD
2012
ACM
199views Data Mining» more  KDD 2012»
12 years 15 days ago
Trustworthy online controlled experiments: five puzzling outcomes explained
Online controlled experiments are often utilized to make datadriven decisions at Amazon, Microsoft, eBay, Facebook, Google, Yahoo, Zynga, and at many other companies. While the th...
Ron Kohavi, Alex Deng, Brian Frasca, Roger Longbot...
RAID
2009
Springer
14 years 4 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
EUROCRYPT
2012
Springer
12 years 14 days ago
Property Preserving Symmetric Encryption
Abstract. Processing on encrypted data is a subject of rich investigation. Several new and exotic encryption schemes, supporting a diverse set of features, have been developed for ...
Omkant Pandey, Yannis Rouselakis