Sciweavers

87 search results - page 12 / 18
» Efficient elastic burst detection in data streams
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 7 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
SIGMOD
2003
ACM
123views Database» more  SIGMOD 2003»
14 years 7 months ago
Distributed deviation detection in sensor networks
Sensor networks have recently attracted much attention, because of their potential applications in a number of different settings. The sensors can be deployed in large numbers in ...
Themistoklis Palpanas, Dimitris Papadopoulos, Vana...
SSDBM
1998
IEEE
107views Database» more  SSDBM 1998»
13 years 11 months ago
Discrete Object Detection and Motion Registration Based on a Data Management Approach
When scientific data sets can be interpreted visually they are typically managed as pictures and consequently stored as large collections of bitmaps. Valuable information containe...
Hans Hinterberger, Bettina Bauer-Messmer
ISCAS
2011
IEEE
342views Hardware» more  ISCAS 2011»
12 years 11 months ago
Parallel Dynamic Voltage and Frequency Scaling for stream decoding using a multicore embedded system
—Parallel structures may be used to increase a system processing speed in case of large amount of data or highly complex calculations. Dynamic Voltage and Frequency Scaling (DVFS...
Ying-Xun Lai, Yueh-Min Huang, Chin-Feng Lai, Ljilj...
TISSEC
2008
100views more  TISSEC 2008»
13 years 7 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu