Sciweavers

503 search results - page 95 / 101
» Output privacy in data mining
Sort
View
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
SDM
2009
SIAM
124views Data Mining» more  SDM 2009»
14 years 4 months ago
Non-parametric Information-Theoretic Measures of One-Dimensional Distribution Functions from Continuous Time Series.
We study non-parametric measures for the problem of comparing distributions, which arise in anomaly detection for continuous time series. Non-parametric measures take two distribu...
Ali Dasdan, Paolo D'Alberto
VLDB
2004
ACM
123views Database» more  VLDB 2004»
14 years 14 days ago
CORDS: Automatic Generation of Correlation Statistics in DB2
When query optimizers erroneously assume that database columns are statistically independent, they can underestimate the selectivities of conjunctive predicates by orders of magni...
Ihab F. Ilyas, Volker Markl, Peter J. Haas, Paul G...
EMNLP
2008
13 years 8 months ago
Automatic Set Expansion for List Question Answering
This paper explores the use of set expansion (SE) to improve question answering (QA) when the expected answer is a list of entities belonging to a certain class. Given a small set...
Richard C. Wang, Nico Schlaefer, William W. Cohen,...
ICSE
2012
IEEE-ACM
11 years 9 months ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer