Author of the publication

Experimental Studies Using Median Polish Procedure to Reduce Alarm Rates in Data Cubes of Intrusion Data.

, , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 457-466. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A peer-to-peer infrastructure for distributing large scientific data sets over wide area high-performance networks: experimental studies using wide area layer 2 services., , and . GridNets, page 8. ICST, (2007)A framework for evaluating the analytic maturity of an organization.. Int. J. Inf. Manag., 38 (1): 45-51 (2018)Simple Available Bandwidth Utilization Library for High-Speed Wide Area Networks., , , , and . J. Supercomput., 34 (3): 231-242 (2005)An Empirical Study of the Universal Chemical Key Algorithm for Assigning Unique Keys to Chemical Compounds., , , and . J. Bioinform. Comput. Biol., 2 (1): 155-172 (2004)Introduction., , , and . Hybrid Systems, volume 736 of Lecture Notes in Computer Science, page 1-3. Springer, (1992)Data mining standards, services, and platforms 2004 (DM-SSP 2004).. SIGKDD Explor., 6 (2): 157-158 (2004)Visual browsing of remote and distributed data., , and . Visualization and Data Analysis, volume 5669 of SPIE Proceedings, page 12-20. SPIE, (2005)Visibility with a Moving Point of View., , , and . SODA, page 107-117. SIAM, (1990)Bandwidth challenge - Transporting sloan digital sky survey data using SECTOR., , , , , , , , , and . SC, page 242. ACM Press, (2006)Labeled Trees and the Efficient Computation of Derivations., and . ISSAC, page 74-80. ACM, (1989)