Sciweavers

122 search results - page 13 / 25
» Exploiting efficient data mining techniques to enhance intru...
Sort
View
SAC
2008
ACM
13 years 6 months ago
Frequent pattern mining for kernel trace data
Operating systems engineers have developed tracing tools that log details about process execution at the kernel level. These tools make it easier to understand the actual executio...
Christopher LaRosa, Li Xiong, Ken Mandelberg
MSWIM
2009
ACM
14 years 1 months ago
An enhanced mechanism for efficient assignment of multiple MBMS sessions towards LTE
The provision of rich multimedia services, such as Mobile TV, is considered of key importance for the Long Term Evolution (LTE) proliferation in mobile market. To this direction, ...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...
ICDE
2006
IEEE
153views Database» more  ICDE 2006»
14 years 8 months ago
ConQueSt: a Constraint-based Querying System for Exploratory Pattern Discovery
ConQueSt is a constraint-based querying system devised with the aim of supporting the intrinsically exploratory nature of pattern discovery. It provides users with an expressive c...
Francesco Bonchi, Fosca Giannotti, Claudio Lucches...
FGR
2004
IEEE
220views Biometrics» more  FGR 2004»
13 years 10 months ago
Integration of 2D and 3D Images for Enhanced Face Authentication
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 7 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye