Sciweavers

193 search results - page 10 / 39
» Online Subpath Profiling
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 12 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
13 years 11 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
ICCBR
2005
Springer
14 years 1 months ago
Re-using Implicit Knowledge in Short-Term Information Profiles for Context-Sensitive Tasks
Typically, case-based recommender systems recommend single items to the on-line customer. In this paper we introduce the idea of recommending a user-defined collection of items whe...
Conor Hayes, Paolo Avesani, Emiliano Baldo, Padrai...
BMCBI
2010
193views more  BMCBI 2010»
13 years 7 months ago
MZmine 2: Modular framework for processing, visualizing, and analyzing mass spectrometry-based molecular profile data
Background: Mass spectrometry (MS) coupled with online separation methods is commonly applied for differential and quantitative profiling of biological samples in metabolomic as w...
Tomás Pluskal, Sandra Castillo, Alejandro V...
DAC
2001
ACM
14 years 8 months ago
JouleTrack - A Web Based Tool for Software Energy Profiling
A software energy estimation methodology is presented that avoids explicit characterization of instruction energy consumption and predicts energy consumption to within 3% accuracy...
Amit Sinha, Anantha Chandrakasan