Sciweavers

1311 search results - page 122 / 263
» Kernel-based relation extraction from investigative data
Sort
View
123
Voted
SAINT
2003
IEEE
15 years 9 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
126
Voted
SSDBM
2005
IEEE
132views Database» more  SSDBM 2005»
15 years 9 months ago
Co-Scheduling of Computation and Data on Computer Clusters
Scientific investigations have to deal with rapidly growing amounts of data from simulations and experiments. During data analysis, scientists typically want to extract subsets o...
Alexandru Romosan, Doron Rotem, Arie Shoshani, Der...
130
Voted
DEXAW
2009
IEEE
113views Database» more  DEXAW 2009»
15 years 10 months ago
Identification of Surgery Indicators by Mining Hospital Data: A Preliminary Study
—The management of patient referrals is an interesting issue when it comes to predicting future patient demand to increase hospital productivity. In general, a patient is referre...
Marie Persson, Niklas Lavesson
141
Voted
BMCBI
2007
147views more  BMCBI 2007»
15 years 3 months ago
Statistical analysis and significance testing of serial analysis of gene expression data using a Poisson mixture model
Background: Serial analysis of gene expression (SAGE) is used to obtain quantitative snapshots of the transcriptome. These profiles are count-based and are assumed to follow a Bin...
Scott D. Zuyderduyn
124
Voted
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
15 years 10 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...