Sciweavers

531 search results - page 43 / 107
» Data structure repair using goal-directed reasoning
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 7 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
CSFW
2011
IEEE
14 years 4 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
DEXAW
2009
IEEE
173views Database» more  DEXAW 2009»
15 years 11 months ago
Automatic Cluster Number Selection Using a Split and Merge K-Means Approach
Abstract—The k-means method is a simple and fast clustering technique that exhibits the problem of specifying the optimal number of clusters preliminarily. We address the problem...
Markus Muhr, Michael Granitzer
ECSQARU
2005
Springer
15 years 10 months ago
Hydrologic Models for Emergency Decision Support Using Bayesian Networks
In the presence of a river flood, operators in charge of control must take decisions based on imperfect and incomplete sources of information (e.g., data provided by a limited numb...
Martín Molina, Raquel Fuentetaja, Luis Garr...
USENIX
1990
15 years 5 months ago
Implementation of the Ficus Replicated File System
As we approach nation-wide integration of computer systems, it is clear that le replication will play a key role, both to improve data availability in the face of failures, and to...
Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Th...