Sciweavers

64 search results - page 10 / 13
» Modeling Set Associative Caches Behavior for Irregular Compu...
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
NIPS
2007
13 years 9 months ago
Hippocampal Contributions to Control: The Third Way
Recent experimental studies have focused on the specialization of different neural structures for different types of instrumental behavior. Recent theoretical work has provided no...
Máté Lengyel, Peter Dayan
TSE
2010
151views more  TSE 2010»
13 years 5 months ago
The Probabilistic Program Dependence Graph and Its Application to Fault Diagnosis
This paper presents an innovative model of a program’s internal behavior over a set of test inputs, called the probabilistic program dependence graph (PPDG), that facilitates pr...
George K. Baah, Andy Podgurski, Mary Jean Harrold
EUROPAR
2003
Springer
14 years 21 days ago
Obtaining Hardware Performance Metrics for the BlueGene/L Supercomputer
Hardware performance monitoring is the basis of modern performance analysis tools for application optimization. We are interested in providing such performance analysis tools for t...
Pedro Mindlin, José R. Brunheroto, Luiz De ...
KDD
2012
ACM
179views Data Mining» more  KDD 2012»
11 years 10 months ago
Transparent user models for personalization
Personalization is a ubiquitous phenomenon in our daily online experience. While such technology is critical for helping us combat the overload of information we face, in many cas...
Khalid El-Arini, Ulrich Paquet, Ralf Herbrich, Jur...