Sciweavers

9015 search results - page 1707 / 1803
» Using Structural Computing to Support Information Integratio...
Sort
View
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
14 years 10 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
14 years 10 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...
SIGECOM
2010
ACM
147views ECommerce» more  SIGECOM 2010»
14 years 3 months ago
Socially desirable approximations for Dodgson's voting rule
In 1876 Charles Lutwidge Dodgson suggested the intriguing voting rule that today bears his name. Although Dodgson’s rule is one of the most well-studied voting rules, it suffers...
Ioannis Caragiannis, Christos Kaklamanis, Nikos Ka...
NAR
1998
229views more  NAR 1998»
13 years 9 months ago
GDB: the Human Genome Database
The Genome Database (GDB, http://www.gdb.org ) is a public repository of data on human genes, clones, STSs, polymorphisms and maps. GDB entries are highly cross-linked to each oth...
Stanley Letovsky, Robert W. Cottingham, Christophe...
COMCOM
2007
149views more  COMCOM 2007»
13 years 9 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
« Prev « First page 1707 / 1803 Last » Next »