• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 266
Next 10 →

A line in the sand: a wireless sensor network for target detection, classification, and tracking

by A. Arora , P. Dutta , S. Bapat , V. Kulathumani , H. Zhang , V. Naik, V. Mittal , H. Cao , M. Demirbas , M. Gouda , Y. Choi , T. Herman , et al. - COMPUTER NETWORKS , 2004
"... Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the intrusion detection problem and the related problems of classifying and tracking targets. Our approach is based on a de ..."
Abstract - Cited by 272 (41 self) - Add to MetaCart
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the intrusion detection problem and the related problems of classifying and tracking targets. Our approach is based on a

Learning from imbalanced data

by Haibo He, Edwardo A. Garcia - IEEE Trans. on Knowledge and Data Engineering , 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract - Cited by 260 (6 self) - Add to MetaCart
Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision

A Modular Approach to Packet Classification: Algorithms and Results

by Thomas Y. C. Woo - In IEEE Infocom , 2000
"... The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic accounting, etc. Various approaches to packet classification have been studied in the literature with accompanying theoretic ..."
Abstract - Cited by 112 (0 self) - Add to MetaCart
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic accounting, etc. Various approaches to packet classification have been studied in the literature with accompanying

Horting Hatches an Egg: A New Graph-Theoretic Approach to Collaborative Filtering

by Charu C. Aggarwal, Joel L. Wolf, Kun-lung Wu, Philip S. Yu - In Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge discovery and data mining , 1999
"... This paper introduces a new and novel approach to ratingbased collaborative filtering. The new technique is most appropriate for e-commerce merchants offering one or more groups of relatively homogeneous items such as compact disks, videos, books, software and the like. In contrast with other known ..."
Abstract - Cited by 133 (1 self) - Add to MetaCart
collaborative filtering techniques, the new algorithm is graph-theoretic, based on the twin new concepts of horting and predictability. As is demonstrated in this paper, the technique is fast, scalable, accurate, and requires only a modest learning curve. It makes use of a hierarchical classification scheme

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
. This will prove to be true throughout our analysis, suggesting that indirect relationships (those requiring intermediation) play a lesser role in the venture capital market. Similarly, outdegree has a relatively small effect economically, which is consistent with the view that this measure captures a VC firm

Requirements Classification and Reuse: Crossing Domain Boundaries

by Jacob L. Cybulski, Karl Reed , 1999
"... A serious problem in the classification of software project artefacts for reuse is the natural partitioning of classification terms into many separate domains of discourse. This problem is particularly pronounced when dealing with requirements artefacts that need to be matched with design components ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
A serious problem in the classification of software project artefacts for reuse is the natural partitioning of classification terms into many separate domains of discourse. This problem is particularly pronounced when dealing with requirements artefacts that need to be matched with design

Organizing Security Patterns Related to Security and Pattern Recognition Requirements

by Michaela Bunke, Rainer Koschke, Karsten Sohr , 2012
"... Software security is an emerging area in software development. More and more vulnerabilities are published and highlight the endangerment of systems. Hence, software designers and programmers are increasingly faced with the need to apply security solutions to software systems. Security patterns are ..."
Abstract - Add to MetaCart
are best practices to handle recurring security problems. The abundance of documented security patterns calls for meaningful classifications to ease searching and assessing the right pattern for a security problem at hand. Existing classifications for security patterns consider only a small number

ORIGINAL ARTICLE Automated classification of non-functional requirements

by Xuchang Zou, Æ Peter Solc
"... Abstract This paper describes a technique for automat-ing the detection and classification of non-functional requirements related to properties such as security, per-formance, and usability. Early detection of non-functional requirements enables them to be incorporated into the initial architectural ..."
Abstract - Add to MetaCart
Abstract This paper describes a technique for automat-ing the detection and classification of non-functional requirements related to properties such as security, per-formance, and usability. Early detection of non-functional requirements enables them to be incorporated into the initial

Privacy-Preserving ECG Classification with Branching

by Mauro Barni, Senior Member, Pierluigi Failla, Riccardo Lazzeretti, Ahmad-reza Sadeghi, Thomas Schneider - Programs and Neural Networks,” Information Forensics and Security – TIFS, IEEE Transactions on , 2011
"... Abstract—Privacy protection is a crucial problem in many biomedical signal processing applications. For this reason, particular attention has been given to the use of secure multi-party computation techniques for processing biomedical signals, whereby nontrusted parties are able to manipulate the si ..."
Abstract - Cited by 13 (5 self) - Add to MetaCart
. Specifically, we present and compare two methods for the secure classification of electrocardiogram (ECG) signals: the former based on linear branching programs (a particular kind of decision tree) and the latter relying on neural networks. The paper deals with all the requirements and difficul-ties related

Reasoning About Confidentiality Requirements

by Simon Foley , 1994
"... Reflexive flow policies provide abstract characterizations of certain multilevel confidentiality requirements. This paper describes how reflexive flow policies can be used to construct and reason about large/complex multilevel policies. In particular, we describe how reflexive policies can be used t ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
to develop and reason about security policies for multilevel relational databases. Our approach facilitates a study of the relationship between security policy design and database design. 1 Introduction Multilevel security is often associated with the military style classification ordering unclass ! secret
Next 10 →
Results 1 - 10 of 266
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University