Sciweavers

4911 search results - page 876 / 983
» Tree dependence analysis
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 10 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
KDD
2007
ACM
165views Data Mining» more  KDD 2007»
14 years 10 months ago
Efficient and effective explanation of change in hierarchical summaries
Dimension attributes in data warehouses are typically hierarchical (e.g., geographic locations in sales data, URLs in Web traffic logs). OLAP tools are used to summarize the measu...
Deepak Agarwal, Dhiman Barman, Dimitrios Gunopulos...
RECOMB
2007
Springer
14 years 10 months ago
Improving Inversion Median Computation Using Commuting Reversals and Cycle Information
In the past decade, genome rearrangements have attracted increasing attention from both biologists and computer scientists as a new type of data for phylogenetic analysis. Methods ...
William Arndt, Jijun Tang
SIGMOD
2007
ACM
183views Database» more  SIGMOD 2007»
14 years 10 months ago
Report on the First International VLDB Workshop on Clean Databases (CleanDB 2006)
In this report, we provide a summary1 of the First Int'l VLDB Workshop on Clean Databases (CleanDB 2006), which took place at Seoul, Korea, on September 11, 2006, in conjunct...
Dongwon Lee, Chen Li
SIGMOD
2005
ACM
127views Database» more  SIGMOD 2005»
14 years 10 months ago
Fossilized Index: The Linchpin of Trustworthy Non-Alterable Electronic Records
As critical records are increasingly stored in electronic form, which tends to make for easy destruction and clandestine modification, it is imperative that they be properly manag...
Qingbo Zhu, Windsor W. Hsu