Sciweavers

2043 search results - page 343 / 409
» Reasoning About Security Models
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
12 years 13 days ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
KDD
2006
ACM
240views Data Mining» more  KDD 2006»
14 years 10 months ago
Adaptive event detection with time-varying poisson processes
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
Alexander T. Ihler, Jon Hutchins, Padhraic Smyth
QI
2009
Springer
117views Physics» more  QI 2009»
14 years 4 months ago
Generalising Unitary Time Evolution
In this third Quantum Interaction (QI) meeting it is time to examine our failures. One of the weakest elements of QI as a field, arises in its continuing lack of models displaying...
Kirsty Kitto, Peter Bruza, Laurianne Sitbon
SEMWEB
2007
Springer
14 years 4 months ago
Hybrid Alignment Strategy for Anatomical Ontologies: Results of the 2007 Ontology Alignment Contest
An ontology is a formal representation of a domain modeling the entities in the domain and their relations. When a domain is represented by multiple ontologies, there is a need for...
Songmao Zhang, Olivier Bodenreider
PLDI
2011
ACM
13 years 25 days ago
Understanding POWER multiprocessors
Exploiting today’s multiprocessors requires highperformance and correct concurrent systems code (optimising compilers, language runtimes, OS kernels, etc.), which in turn requir...
Susmit Sarkar, Peter Sewell, Jade Alglave, Luc Mar...