Sciweavers

3895 search results - page 99 / 779
» Measuring the effectiveness of ACATS
Sort
View
IDA
2010
Springer
15 years 2 months ago
Clustering with feature order preferences
We propose a clustering algorithm that effectively utilizes feature order preferences, which have the form that feature s is more important than feature t. Our clustering formulati...
Jun Sun, Wenbo Zhao, Jiangwei Xue, Zhiyong Shen, Y...
210
Voted
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
14 years 7 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
EUROPAR
2004
Springer
15 years 7 months ago
Overhead Compensation in Performance Profiling
Measurement-based profiling introduces intrusion in program execution. Intrusion effects can be mitigated by compensating for measurement overhead. Techniques for compensation anal...
Allen D. Malony, Sameer Shende
157
Voted
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 4 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
MSWIM
2005
ACM
15 years 9 months ago
Performance analysis of the intertwined effects between network layers for 802.11g transmissions
While the canonical behavior of today’s home Internet users involves several residents concurrently executing diverse Internet applications, the most common home configuration ...
Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant...