Sciweavers

1168 search results - page 95 / 234
» Database Component Ware
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 4 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
EDBT
2008
ACM
142views Database» more  EDBT 2008»
16 years 4 months ago
An access control mechanism for P2P collaborations
We introduce a fine grained access control mechanism for Peer-to-Peer collaborations. It is based on the local access control components of the participants. The peers export thei...
Christoph Sturm, Klaus R. Dittrich, Patrick Ziegle...
SSDBM
2008
IEEE
114views Database» more  SSDBM 2008»
15 years 10 months ago
A General Framework for Increasing the Robustness of PCA-Based Correlation Clustering Algorithms
Abstract. Most correlation clustering algorithms rely on principal component analysis (PCA) as a correlation analysis tool. The correlation of each cluster is learned by applying P...
Hans-Peter Kriegel, Peer Kröger, Erich Schube...
DEXAW
2007
IEEE
116views Database» more  DEXAW 2007»
15 years 10 months ago
Regression Relevance Models for Data Fusion
Data fusion has been investigated by many researchers in the information retrieval community and has become an effective technique for improving retrieval effectiveness. In this p...
Shengli Wu, Yaxin Bi, Sally I. McClean
ICDE
2007
IEEE
90views Database» more  ICDE 2007»
15 years 10 months ago
Music Recommendation Mapping and Interface Based on Structural Network Entropy
Recommendation systems generally produce the results of their output to their users in the form of an ordinal list. In the interest of simplicity, these lists are often obscure, ,...
Justin Donaldson