: For many KDD applications finding the outliers, i.e. the rare events, is more interesting and useful than finding the common cases, e.g. detecting criminal activities in E-commer...
Markus M. Breunig, Hans-Peter Kriegel, Raymond T. ...
This paper presents an approach to statically retrofit legacy servers with mechanisms for authorization policy enforcement. The approach is based upon the observation that securit...
Vinod Ganapathy, Dave King 0002, Trent Jaeger, Som...
: Semantic clustering is important to various fields in the modern information society. In this work we applied the Independent Component Analysis method to the extraction of the f...
models evolve at different levels of abstraction, from the requirements specification to development of the source code. The models underlying this process are related and their ...