Sciweavers

1804 search results - page 348 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SSD
2009
Springer
145views Database» more  SSD 2009»
14 years 3 months ago
Versioning of Network Models in a Multiuser Environment
The standard database mechanisms for concurrency control, which include transactions and locking protocols, do not provide the support needed for updating complex geographic data i...
Petko Bakalov, Erik G. Hoel, Sudhakar Menon, Vassi...
ISLPED
2004
ACM
139views Hardware» more  ISLPED 2004»
14 years 2 months ago
Eliminating voltage emergencies via microarchitectural voltage control feedback and dynamic optimization
Microprocessor designers use techniques such as clock gating to reduce power dissipation. An unfortunate side-effect of these techniques is the processor current fluctuations th...
Kim M. Hazelwood, David Brooks
KDD
2010
ACM
253views Data Mining» more  KDD 2010»
14 years 19 days ago
Mining periodic behaviors for moving objects
Periodicity is a frequently happening phenomenon for moving objects. Finding periodic behaviors is essential to understanding object movements. However, periodic behaviors could b...
Zhenhui Li, Bolin Ding, Jiawei Han, Roland Kays, P...
BMCBI
2006
130views more  BMCBI 2006»
13 years 8 months ago
CARMA: A platform for analyzing microarray datasets that incorporate replicate measures
Background: The incorporation of statistical models that account for experimental variability provides a necessary framework for the interpretation of microarray data. A robust ex...
Kevin A. Greer, Matthew R. McReynolds, Heddwen L. ...
NAR
2002
138views more  NAR 2002»
13 years 8 months ago
The KEGG databases at GenomeNet
The Kyoto Encyclopedia of Genes and Genomes (KEGG) is the primary database resource of the Japanese GenomeNet service (http://www.genome.ad.jp/) for understanding higher order fun...
Minoru Kanehisa, Susumu Goto, Shuichi Kawashima, A...