Sciweavers

2799 search results - page 138 / 560
» computing 1998
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 6 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
111
Voted
COMPGEOM
1998
ACM
15 years 6 months ago
Interval Arithmetic Yields Efficient Dynamic Filters for Computational Geometry
We discuss floating-point filters as a means of restricting the precision needed for arithmetic operations while still computing the exact result. We show that interval techniques...
Hervé Brönnimann, Christoph Burnikel, ...
ISPD
1998
ACM
99views Hardware» more  ISPD 1998»
15 years 6 months ago
New efficient algorithms for computing effective capacitance
We describe a novel iterationless approach for computing the effective capacitance of an interconnect load at a driving gate output. Our new approach is considerably faster than p...
Andrew B. Kahng, Sudhakar Muddu
134
Voted
ICMLA
2003
15 years 3 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
150
Voted
FIW
1998
105views Communications» more  FIW 1998»
15 years 3 months ago
Feature Interaction Problem in Computer-Telephony Integration Systems
In this paper we describe an ongoing project aimed at investigating the impact of feature interaction problems on computer telephony integration (CTI). As a representative and soph...
Nikolay A. Anisimov, Alec Miloslavski, Gregory Pog...