Sciweavers

1291 search results - page 169 / 259
» Intrusion Detection for Distributed Applications
Sort
View
KDD
2006
ACM
381views Data Mining» more  KDD 2006»
14 years 9 months ago
GPLAG: detection of software plagiarism by program dependence graph analysis
Along with the blossom of open source projects comes the convenience for software plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open source pr...
Chao Liu 0001, Chen Chen, Jiawei Han, Philip S. Yu
CN
2008
127views more  CN 2008»
13 years 9 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
TMI
2010
160views more  TMI 2010»
13 years 7 months ago
Computer-Aided Detection of Polyps in CT Colonography Using Logistic Regression
—We present a computer-aided detection (CAD) system for computed tomography colonography that orders the polyps according to clinical relevance. The CAD system consists of two st...
Vincent Frans van Ravesteijn, Cees van Wijk, Frans...
ISCA
2011
IEEE
270views Hardware» more  ISCA 2011»
13 years 15 days ago
Sampling + DMR: practical and low-overhead permanent fault detection
With technology scaling, manufacture-time and in-field permanent faults are becoming a fundamental problem. Multi-core architectures with spares can tolerate them by detecting an...
Shuou Nomura, Matthew D. Sinclair, Chen-Han Ho, Ve...
KDD
2005
ACM
104views Data Mining» more  KDD 2005»
14 years 9 months ago
A hit-miss model for duplicate detection in the WHO drug safety database
The WHO Collaborating Centre for International Drug Monitoring in Uppsala, Sweden, maintains and analyses the world's largest database of reports on suspected adverse drug re...
Andrew Bate, G. Niklas Norén, Roland Orre