Sciweavers

1424 search results - page 57 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
VLDB
2005
ACM
125views Database» more  VLDB 2005»
14 years 1 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
SIGADA
2005
Springer
14 years 1 months ago
Experiences using SPARK in an undergraduate CS course
This paper describes experiences garnered while teaching a course on high integrity software using SPARK to a mix of junior and senior level undergraduates. The paper describes th...
Anthony S. Ruocco
STORAGESS
2005
ACM
14 years 1 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
IJCAI
1997
13 years 9 months ago
Name-It: Naming and Detecting Faces in Video by the Integration of Image and Natural Language Processing
We have been developing Name-It, a system that associates faces and names in news videos. First, as the only knowledge source, the system is given news videos which include image ...
Shin'ichi Satoh, Yuichi Nakamura, Takeo Kanade
CCS
2007
ACM
14 years 2 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia