Sciweavers

3339 search results - page 635 / 668
» Relational Learning by Imitation
Sort
View
VIZSEC
2007
Springer
14 years 1 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
VLDB
2007
ACM
137views Database» more  VLDB 2007»
14 years 1 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
BIBE
2006
IEEE
138views Bioinformatics» more  BIBE 2006»
14 years 1 months ago
Assigning Schema Labels Using Ontology And Hueristics
Bioinformatics data is growing at a phenomenal rate. Besides the exponential growth of individual databases, the number of data depositories is increasing too. Because of the comp...
Xuan Zhang, Ruoming Jin, Gagan Agrawal
IJCNN
2006
IEEE
14 years 1 months ago
An optimization approach to achieve unsupervised segmentation and binding in a dynamical network
— We present a novel network of oscillatory units, whose behavior is described by the amplitude and phase of oscillations. While building on previous work, the system presented i...
A. Ravishankar Rao, Guillermo A. Cecchi, Charles C...
DOCENG
2006
ACM
14 years 1 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...