Sciweavers

417 search results - page 11 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
PTS
2007
120views Hardware» more  PTS 2007»
13 years 9 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
DASFAA
2009
IEEE
89views Database» more  DASFAA 2009»
14 years 2 months ago
FlexBench: A Flexible XML Query Benchmark
Abstract. In this paper we propose a new approach to XML benchmarking – a flexible XML query benchmark called FlexBench. The flexibility is given by two aspects. Firstly, FlexB...
Maros Vranec, Irena Mlýnková
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
14 years 1 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 5 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
WCET
2007
13 years 9 months ago
Finding DU-Paths for Testing of Multi-Tasking Real-Time Systems using WCET Analysis
Memory corruption is one of the most common software failures. For sequential software and multitasking software with synchronized data accesses, it has been shown that program fa...
Daniel Sundmark, Anders Pettersson, Christer Sandb...