Sciweavers

658 search results - page 78 / 132
» Open problems in the security of learning
Sort
View
RAID
2010
Springer
13 years 7 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
BMCBI
2006
150views more  BMCBI 2006»
13 years 9 months ago
Instance-based concept learning from multiclass DNA microarray data
Background: Various statistical and machine learning methods have been successfully applied to the classification of DNA microarray data. Simple instance-based classifiers such as...
Daniel P. Berrar, Ian Bradbury, Werner Dubitzky
SIGCSE
2002
ACM
229views Education» more  SIGCSE 2002»
13 years 8 months ago
GraphicsMentor: a tool for learning graphics fundamentals
This paper discusses the functionality of GraphicsMentor. GraphicsMentor permits a student to modify many parameters of the camera, objects, and light sources interactively, and t...
Dejan Nikolic, Ching-Kuang Shene
ICALT
2005
IEEE
14 years 2 months ago
E-Learning Teaching Material Support System for Public Vocational Training
In Vocational training, trainees with every age groups have various kinds of vocational and educational. Instructors of vocational training have to teach them according to their d...
Norikatsu Fujita, Toshihiro Hayashi, Toshinori Yam...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 9 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan